Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
暂无分享,去创建一个
[1] Kenneth G. Paterson,et al. On the Security of RC4 in TLS , 2013, USENIX Security Symposium.
[2] Christof Paar,et al. Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering , 2013, FPGA '13.
[3] Christof Paar,et al. Improving Side-Channel Analysis with Optimal Linear Transforms , 2012, CARDIS.
[4] Graham Steel,et al. Efficient Padding Oracle Attacks on Cryptographic Hardware , 2012, IACR Cryptol. ePrint Arch..
[5] Sylvain Guilley,et al. Portability of templates , 2012, Journal of Cryptographic Engineering.
[6] Christof Paar,et al. Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism , 2012, CT-RSA.
[7] Frederik Vercauteren,et al. Practical Realisation and Elimination of an ECC-Related Software Bug Attack , 2012, CT-RSA.
[8] Ran Canetti,et al. Advances in Cryptology – CRYPTO 2012 , 2012, Lecture Notes in Computer Science.
[9] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[10] Christof Paar,et al. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World , 2011, CHES.
[11] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[12] Deian Stefan,et al. Fast Implementations of AES on Various Platforms , 2009, IACR Cryptol. ePrint Arch..
[13] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[14] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[15] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[16] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[17] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[18] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[19] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[20] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[21] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[22] Attacks on and Countermeasures for USB Hardware Token Devices , 2000 .
[23] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[24] John Rekenthaler. Don't Believe Everything You Read , 1998 .