Improving DPA by Peak Distribution Analysis
暂无分享,去创建一个
Jerry den Hartog | Jing Pan | Jasper G. J. van Woudenberg | Marc F. Witteman | J. D. Hartog | Jing-shan Pan | J. V. Woudenberg | M. Witteman
[1] Tatsuaki Okamoto. Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.
[2] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[3] Chae Hoon Lim,et al. Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.
[4] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[5] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[6] Thomas Jensen,et al. Smart Card Programming and Security , 2001, Lecture Notes in Computer Science.
[7] Erik P. de Vink,et al. An Operation-Based Metric for CPA Resistance , 2008, SEC.
[8] Elisabeth Oswald,et al. Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings , 2008, CHES.
[9] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[10] Christophe Clavier,et al. Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.
[11] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[12] Moti Yung,et al. A New Randomness Extraction Paradigm for Hybrid Encryption , 2009, EUROCRYPT.
[13] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.
[14] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[15] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[16] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[17] Stefan Mangard,et al. Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.
[18] M. Richman,et al. Euclidean Distance as a Similarity Metric for Principal Component Analysis , 2001 .
[19] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[20] Bart Preneel,et al. Mutual Information Analysis A Generic Side-Channel Distinguisher , 2008 .
[21] Jasper G. J. van Woudenberg,et al. Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.
[22] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[23] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[24] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[25] Ingrid Verbauwhede,et al. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices , 2009, ICISC.
[26] Erik Knudsen,et al. Ways to Enhance Differential Power Analysis , 2002, ICISC.