Side channel resistance quantification and verification
暂无分享,去创建一个
[1] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.
[2] E. Oswald,et al. Power Analysis Tutorial , 2000 .
[3] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[4] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[5] Vittorio Zaccaria,et al. AES power attack based on induced cache miss and countermeasure , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[6] David J. Lilja,et al. Measuring computer performance : A practitioner's guide , 2000 .
[7] Eran Tromer,et al. Acoustic cryptanalysis : on nosy people and noisy machines , 2004 .
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[12] Bart Preneel,et al. Power-analysis attack on an ASIC AES implementation , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..