Collision Timing Attack when Breaking 42 AES ASIC Cores
暂无分享,去创建一个
[1] Andrey Bogdanov,et al. Multiple-Differential Side-Channel Collision Attacks on AES , 2008, CHES.
[2] A. Satoh,et al. An on-chip glitchy-clock generator and its application to safe-error attack , 2011 .
[3] Christophe Giraud,et al. DFA on AES , 2004, AES Conference.
[4] Takeshi Sugawara,et al. High-Performance Concurrent Error Detection Scheme for AES Hardware , 2008, CHES.
[5] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[6] Thomas Eisenbarth,et al. Correlation-Enhanced Power Analysis Collision Attack , 2010, CHES.
[7] Elena Trichina,et al. Combinational Logic Design for AES SubByte Transformation on Masked Data , 2003, IACR Cryptol. ePrint Arch..
[8] Vincent Rijmen,et al. Threshold Implementations Against Side-Channel Attacks and Glitches , 2006, ICICS.
[9] Andrey Bogdanov,et al. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs , 2010, CT-RSA.
[10] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[11] Jean-Pierre Seifert,et al. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) , 2003, Financial Cryptography.
[12] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[13] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[14] Jean-Jacques Quisquater,et al. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.
[15] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[16] Daisuke Suzuki,et al. A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques , 2009, CHES.
[17] Yang Li,et al. Fault Sensitivity Analysis , 2010, CHES.
[18] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[19] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.