Multi-channel Attacks
暂无分享,去创建一个
[1] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[2] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[3] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[4] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[5] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[6] L. Goubin,et al. DES and Differential Power Analysis , 1999 .
[7] Jean-Sébastien Coron,et al. Statistics and Secret Leakage , 2000, Financial Cryptography.
[8] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[9] Thomas Jensen,et al. Smart Card Programming and Security , 2001, Lecture Notes in Computer Science.
[10] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[11] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[12] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[13] C. D. Walter,et al. Distinguishing Exponent Digits by Observing Modular Subtractions , 2001, CT-RSA.
[14] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[15] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[16] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[17] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[18] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.