Efficient mapping of EM radiation associated with information leakage for cryptographic devices
暂无分享,去创建一个
Jean-Luc Danger | Yu-ichi Hayashi | T. Mizuki | H. Sone | N. Homma | T. Aoki | H. Shimada | L. Sauvage
[1] Hidenori Sekiguchi,et al. MEASUREMENT OF RADIATED COMPUTER RGB SIGNALS , 2009 .
[2] Takeshi Sugawara,et al. Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules , 2009, WISA.
[3] Lionel Torres,et al. Magnitude squared incoherence EM analysis for integrated cryptographic module localisation , 2009 .
[4] Martin Feldhofer,et al. On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices , 2009, WISA.
[5] Yongdae Kim,et al. Biasing power traces to improve correlation in power analysis attacks , 2010 .
[6] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] T. Mizuki,et al. Suppression of information leakage from electronic devices based on SNR , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.
[9] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[10] Sylvain Guilley,et al. Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module , 2009, TRETS.
[11] C. Paul. Introduction to Electromagnetic Compatibility (Wiley Series in Microwave and Optical Engineering) , 2006 .
[12] Denis Réal,et al. Enhancing correlation electromagnetic attack using planar near-field cartography , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.
[13] ChangKyun Kim,et al. Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA , 2007 .
[14] N. Homma,et al. Identification of information leakage spots on a cryptographic device with an RSA processor , 2011, 2011 IEEE International Symposium on Electromagnetic Compatibility.
[15] Markus G. Kuhn. Security Limits for Compromising Emanations , 2005, CHES.
[16] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[17] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[18] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.