Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm
暂无分享,去创建一个
[1] Jean-Louis Lacoume,et al. Efficient Solution for Misalignment of Signal in Side Channel Analysis , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[2] Catherine H. Gebotys,et al. EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.
[3] Stefan Mangard,et al. Power and EM Attacks on Passive 13.56 MHz RFID Devices , 2007, CHES.
[4] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[5] Jean-Louis Lacoume,et al. Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant , 2007, IEEE Transactions on Information Forensics and Security.
[6] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[7] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[8] ChangKyun Kim,et al. Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA , 2007 .
[9] Adi Shamir,et al. Remote Password Extraction from RFID Tags , 2007, IEEE Transactions on Computers.
[10] Jongin Lim,et al. Differential power analysis on countermeasures using binary signed digit representations , 2007 .
[11] Christof Paar,et al. A Collision-Attack on AES: Combining Side Channel- and Differential-Attack , 2004, CHES.
[12] Christophe Clavier,et al. Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.
[13] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[14] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[15] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[16] Jongsung Kim,et al. Improved Side‐Channel Attack on DES with the First Four Rounds Masked , 2009 .
[17] William P. Marnane,et al. Correlation Power Analysis of Large Word Sizes , 2007 .
[18] B. Preneel,et al. Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".
[19] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .