Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World
暂无分享,去创建一个
[1] Catherine H. Gebotys,et al. EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.
[2] Patel,et al. Information Security: Theory and Practice , 2008 .
[3] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[4] Norman Bonnett. Transmission of Digital Signals , 1992 .
[5] Christof Paar,et al. Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation , 2011, RFIDSec.
[6] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[7] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[8] Jasper G. J. van Woudenberg,et al. Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.
[9] Christophe Clavier,et al. Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.
[10] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[11] Vijay K. Garg,et al. 3 – Transmission of Digital Signals , 2005 .
[12] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[13] Christof Paar,et al. EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment , 2009, WISA.
[14] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[15] Elisabeth Oswald,et al. Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings , 2008, CHES.
[16] Christof Paar,et al. Chameleon: A Versatile Emulator for Contactless Smartcards , 2010, ICISC.
[17] M. Schwartz,et al. Communication Systems and Techniques , 1996, IEEE Communications Magazine.
[18] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[19] Elisabeth Oswald,et al. Practical Template Attacks , 2004, WISA.
[20] Martin Feldhofer,et al. Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes , 2008 .
[21] Aggelos Kiayias,et al. Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings , 2011, CT-RSA.
[22] P. Mahalanobis. On the generalized distance in statistics , 1936 .
[23] François-Xavier Standaert,et al. Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.
[24] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[25] Bart Preneel,et al. Mutual Information Analysis A Generic Side-Channel Distinguisher , 2008 .
[26] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[27] Christof Paar,et al. An Embedded System for Practical Security Analysis of Contactless Smartcards , 2007, WISTP.
[28] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[29] David Evans,et al. Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.
[30] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[31] Martín Abadi,et al. Code-Carrying Authorization , 2008, ESORICS.
[32] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[33] Stefan Mangard,et al. Power and EM Attacks on Passive 13.56 MHz RFID Devices , 2007, CHES.
[34] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[35] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[36] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[37] Bart Jacobs,et al. Dismantling MIFARE Classic , 2008, ESORICS.