Early feedback on side-channel risks with accelerated toggle-counting
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. Simulation models for side-channel information leaks , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[2] Ken Mai,et al. Extended abstract: A high-performance, low-overhead, power-analysis-resistant, single-rail logic style , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[3] Daisuke Suzuki,et al. DPA Leakage Models for CMOS Logic Circuits , 2005, CHES.
[4] Vincent Rijmen,et al. A Side-Channel Analysis Resistant Description of the AES S-Box , 2005, FSE.
[5] Kris Tiri,et al. Side-Channel Attack Pitfalls , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[6] Johannes Blömer,et al. Provably Secure Masking of AES , 2004, IACR Cryptol. ePrint Arch..
[7] Stefan Mangard,et al. Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.
[8] Daisuke Suzuki,et al. Leakage Analysis of DPA Countermeasures at the Logic Level , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[9] Patrick Schaumont,et al. A Component-Based Design Environment for ESL Design , 2006, IEEE Design & Test of Computers.
[10] Mohammad Tehranipoor,et al. IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings , 2008, IEEE International Symposium on Hardware Oriented Security and Trust.
[11] Hugo De Man,et al. SWAN: high-level simulation methodology for digital substrate noise generation , 2006, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[12] Stefan Mangard,et al. Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations , 2006, CHES.
[13] Sylvain Guilley,et al. Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors , 2007, IEEE Design & Test of Computers.