FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags
暂无分享,去创建一个
Ingrid Verbauwhede | Lejla Batina | Roel Maes | Junfeng Fan | Miroslav Knezevic | Dusko Karaklajic | Vladimir Rozic | Roel Maes | Vladimir Rožić | I. Verbauwhede | L. Batina | Miroslav Knezevic | Junfeng Fan | Dusko Karaklajic
[1] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[2] L. Batina,et al. EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol , 2008, 2008 IEEE International Conference on RFID.
[3] Neal Koblitz,et al. Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.
[4] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[5] A. Satoh,et al. Side-Channel Attack Standard Evaluation Board SASEBO-W for Smartcard Testing , 2011 .
[6] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[7] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[8] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[9] Marc Joye,et al. The Montgomery Powering Ladder , 2002, CHES.