Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
暂无分享,去创建一个
K. Ohta | J. Danger | Nicolas Veyrat-Charvillon | S. Guilley | Benoît Gérard | M. A. Elaabid | L. Sauvage | Victor Lomné | Annelie Heuser | Christophe Clavier | W. Schindler | M. Kasper | K. Sakiyama | Yang Li | Matthieu Walle | Guillaume Duc | Marc Stöttinger | Antoine Wurcker | Daisuke Nakatsu
[1] Mitsugu Iwamoto,et al. Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher , 2012, ICISC.
[2] François-Xavier Standaert,et al. An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..
[3] Sylvain Guilley,et al. RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[4] Werner Schindler,et al. A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models , 2012, CT-RSA.
[5] Sylvain Guilley,et al. "Rank Correction": A New Side-Channel Approach for Secret Key Recovery , 2011, InfoSecHiComNet.
[6] Werner Schindler,et al. How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis , 2011, 2011 14th Euromicro Conference on Digital System Design.
[7] Sylvain Guilley,et al. Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator , 2010, AFRICACRYPT.
[8] Matthieu Rivain,et al. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.
[9] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[10] Christof Paar,et al. Templates vs. Stochastic Methods , 2006, CHES.
[11] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[12] André K. Nieuwland,et al. Reducing Cross-Talk Induced Power Consumption and Delay , 2004, PATMOS.
[13] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[14] I. Jolliffe. Principal Component Analysis , 2005 .
[15] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[16] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[17] Michael A. Saunders,et al. LSQR: An Algorithm for Sparse Linear Equations and Sparse Least Squares , 1982, TOMS.
[18] Yang Li,et al. Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements , 2011, IACR Cryptol. ePrint Arch..
[19] Takeo Kanade,et al. Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation , 2010, Lecture Notes in Computer Science.
[20] François-Xavier Standaert,et al. Improving the Rules of the DPA Contest , 2008, IACR Cryptol. ePrint Arch..
[21] Christof Paar,et al. Templates vs. stochastic methods : A performance analysis for side channel cryptanalysis , 2006 .
[22] Oh-Kyong Kwon,et al. A new on-chip interconnect crosstalk model and experimental verification for CMOS VLSI circuit design , 2000 .
[23] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .