Power consumption traces realignment to improve differential power analysis
暂无分享,去创建一个
[1] Giorgio Di Natale,et al. Evaluation of Resistance to Differential Power Analysis: Execution Time Optimizations for Designers , 2010, 2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications.
[2] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[3] Israel Koren,et al. Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices? , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.
[4] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[5] Arash Reyhani-Masoleh,et al. Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard , 2009, J. Electron. Test..
[6] Giorgio Di Natale,et al. An Integrated Validation Environment for Differential Power Analysis , 2008, 4th IEEE International Symposium on Electronic Design, Test and Applications (delta 2008).
[7] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[8] Huiyun Li. Security evaluation at design time for cryptographic hardware , 2006 .