A First Study of Compressive Sensing for Side-Channel Leakage Sampling
暂无分享,去创建一个
[1] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[2] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[3] François-Xavier Standaert,et al. Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.
[4] Catherine H. Gebotys,et al. EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.
[5] Amir Moradi,et al. Leakage Detection with the χ 2-Test , 2018 .
[6] R. DeVore,et al. A Simple Proof of the Restricted Isometry Property for Random Matrices , 2008 .
[7] Michael A. Saunders,et al. Atomic Decomposition by Basis Pursuit , 1998, SIAM J. Sci. Comput..
[8] Daniel Genkin,et al. ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs , 2016, CT-RSA.
[9] Deanna Needell,et al. Signal Recovery From Incomplete and Inaccurate Measurements Via Regularized Orthogonal Matching Pursuit , 2007, IEEE Journal of Selected Topics in Signal Processing.
[10] An Wang,et al. Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices , 2017, Comput. Electr. Eng..
[11] Cécile Canovas,et al. Enhancing Dimensionality Reduction Methods for Side-Channel Attacks , 2015, CARDIS.
[12] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[13] Elisabeth Oswald,et al. Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems , 2002, CHES.
[14] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[15] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[16] Thomas Eisenbarth,et al. Simpler, Faster, and More Robust T-Test Based Leakage Detection , 2016, COSADE.
[17] Michael Tunstall,et al. SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip , 2015, CHES.
[18] François Durvaux,et al. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces , 2016, EUROCRYPT.
[19] Cécile Canovas,et al. Kernel Discriminant Analysis for Information Extraction in the Presence of Masking , 2016, CARDIS.
[20] Olgica Milenkovic,et al. Subspace Pursuit for Compressive Sensing Signal Reconstruction , 2008, IEEE Transactions on Information Theory.
[21] Jian Wang,et al. Generalized Orthogonal Matching Pursuit , 2011, IEEE Transactions on Signal Processing.
[22] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[23] Domenic Forte,et al. Power-based Side-Channel Instruction-level Disassembler , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[24] Elisabeth Oswald,et al. Practical Template Attacks , 2004, WISA.
[25] Deanna Needell,et al. CoSaMP: Iterative signal recovery from incomplete and inaccurate samples , 2008, ArXiv.
[26] Stéphane Mallat,et al. Matching pursuits with time-frequency dictionaries , 1993, IEEE Trans. Signal Process..
[27] Sylvain Guilley,et al. First Principal Components Analysis: A New Side Channel Distinguisher , 2010, ICISC.
[28] Emmanuel J. Candès,et al. Quantitative Robust Uncertainty Principles and Optimally Sparse Decompositions , 2004, Found. Comput. Math..
[29] Kouichi Sakurai,et al. Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves , 2005, ICICS.
[30] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[31] Debdeep Mukhopadhyay,et al. How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?* , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[32] Degang Sun,et al. Manifold Learning Towards Masking Implementations: A First Study , 2017, IACR Cryptol. ePrint Arch..
[33] Anamitra Makur,et al. Signal Recovery from Random Measurements via Extended Orthogonal Matching Pursuit , 2015, IEEE Transactions on Signal Processing.