SASEBO-GIII: A hardware security evaluation board equipped with a 28-nm FPGA
暂无分享,去创建一个
Y. Hori | A. Sasaki | T. Katashita | A. Satoh | A. Satoh | T. Katashita | Y. Hori | Akihiko Sasaki | A. Sasaki | Akashi Satoh
[1] A. Satoh,et al. Tackling the Security Issues of FPGA Partial Reconfiguration with Physical Unclonable Functions ( ERSA ’ 12 Academic Invited Paper ) , 2012 .
[2] Kerstin Lemke-Rust,et al. Models and algorithms for physical cryptanalysis , 2007 .
[3] Akashi Satoh,et al. Electromagnetic Side-channel Attack against 28-nm FPGA Device , 2012 .
[4] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[5] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[6] Sergei Skorobogatov,et al. In the blink of an eye: There goes your AES key , 2012, IACR Cryptol. ePrint Arch..
[7] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[8] Sergei Skorobogatov,et al. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 2012, CHES.
[9] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[10] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[11] Akashi Satoh,et al. Development of a standard evaluation environment for side channel attacks - , .
[12] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[13] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[14] Christof Paar,et al. On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism , 2011, IACR Cryptol. ePrint Arch..
[15] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.