Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR
暂无分享,去创建一个
[1] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[2] Elisabeth Oswald,et al. A fair evaluation framework for comparing side-channel distinguishers , 2011, Journal of Cryptographic Engineering.
[3] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[4] A. Adam Ding,et al. A Statistical Model for DPA with Novel Algorithmic Confusion Analysis , 2012, CHES.
[5] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[6] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[7] Stefan Mangard,et al. One for all - all for one: unifying standard differential power analysis attacks , 2011, IET Inf. Secur..
[8] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[9] Emmanuel Prouff. Constructive Side-Channel Analysis and Secure Design , 2014, Lecture Notes in Computer Science.
[10] Stefan Mangard,et al. Power Analysis Attacks and Countermeasures , 2007, IEEE Design & Test of Computers.
[11] Cathy Comerford. The key to success. , 2015, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[12] Matthieu Rivain,et al. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.
[13] Vincent Rijmen,et al. Rijndael/AES , 2005, Encyclopedia of Cryptography and Security.
[14] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[15] Sylvain Guilley,et al. A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis , 2014, IACR Cryptol. ePrint Arch..
[16] Sylvain Guilley,et al. Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory , 2014, IACR Cryptol. ePrint Arch..
[17] Claude Carlet,et al. Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience , 2017, ACNS.
[18] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[19] Ingrid Verbauwhede,et al. A Note on the Use of Margins to Compare Distinguishers , 2014, COSADE.
[20] Elisabeth Oswald,et al. An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis , 2011, CARDIS.
[21] Adrian Thillard,et al. How to Estimate the Success Rate of Higher-Order Side-Channel Attacks , 2014, IACR Cryptol. ePrint Arch..
[22] Liwei Zhang,et al. A statistics-based success rate model for DPA and CPA , 2015, Journal of Cryptographic Engineering.
[23] Matthew J. B. Robshaw,et al. Cryptographic Hardware and Embedded Systems – CHES 2014 , 2014, Lecture Notes in Computer Science.