Design of an AES Device as Device Under Test in a DPA Attack
暂无分享,去创建一个
[1] Massoud Masoumi,et al. Efficient implementation of masked AES on Side-Channel Attack Standard Evaluation Board , 2015, 2015 International Conference on Information Society (i-Society).
[2] Minsu Choi,et al. Measurement and Evaluation of Power Analysis Attacks on Asynchronous S-Box , 2012, IEEE Transactions on Instrumentation and Measurement.
[3] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[4] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[5] Jorge Nakahara. Analysis of Venkaiah et al.'s AES Design , 2009, Int. J. Netw. Secur..
[6] Adang Suwandi Ahmad,et al. DPA-countermeasure with knowledge growing system , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).
[7] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[8] Onkar S. Dhede,et al. A review: Hardware Implementation of AES using minimal resources on FPGA , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[9] Cheng-Chi Lee,et al. Cryptanalysis and improvement on batch verifying multiple RSA digital signatures , 2006, Appl. Math. Comput..
[10] Chin-Chen Chang,et al. A new key assignment scheme for enforcing complicated access control policies in hierarchy , 2003, Future Gener. Comput. Syst..
[11] Nidhi Goel,et al. FPGA implementation of an 8-bit AES architecture: A rolled and masked S-Box approach , 2015, 2015 Annual IEEE India Conference (INDICON).
[12] Sylvain Guilley,et al. Common framework to evaluate modern embedded systems against side-channel attacks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[13] Manfred Glesner,et al. An FPGA implementation of the AES-Rijndael in OCB/ECB modes of operation , 2005, Microelectron. J..
[14] Kailash J. Karande,et al. Area optimized implementation of AES algorithm on FPGA , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[15] Min-Shiang Hwang,et al. Challenges in E-Government and Security of Information , 2004 .
[16] Miguel A. Vega-Rodríguez,et al. A new methodology to implement the AES algorithm using partial and dynamic reconfiguration , 2010, Integr..
[17] Gulom Numovych Tuychiev. The Encryption Algorithms GOST28147–89–IDEA8–4 and GOST28147–89–RFWKIDEA8–4 , 2017 .
[18] A. Satoh,et al. Side-Channel Attack Standard Evaluation Board SASEBO-W for Smartcard Testing , 2011 .
[19] Selçuk Köse,et al. A Voltage Regulator-Assisted Lightweight AES Implementation Against DPA Attacks , 2016, IEEE Transactions on Circuits and Systems I: Regular Papers.
[20] Jovan Dj. Golic,et al. Multiplicative Masking and Power Analysis of AES , 2002, CHES.
[21] Adang Suwandi Ahmad,et al. Power analysis attack on implementation of DES , 2016, 2016 International Conference on Information Technology Systems and Innovation (ICITSI).
[22] Garrett S. Rose,et al. Power Profile Obfuscation Using Nanoscale Memristive Devices to Counter DPA Attacks , 2015, IEEE Transactions on Nanotechnology.