Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
暂无分享,去创建一个
[1] Christof Paar,et al. Improving Side-Channel Analysis with Optimal Linear Transforms , 2012, CARDIS.
[2] Jasper G. J. van Woudenberg,et al. Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.
[3] Jasper G. J. van Woudenberg,et al. Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis , 2012, CT-RSA.
[4] Tim Güneysu,et al. Generic Side-Channel Countermeasures for Reconfigurable Devices , 2011, CHES.
[5] Julie Ferrigno,et al. When AES blinks: introducing optical side channel , 2008, IET Inf. Secur..
[6] Christophe Clavier,et al. Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.
[7] Kostas Papagiannopoulos,et al. Mind the Gap: Towards Secure 1st-Order Masking in Software , 2017, COSADE.
[8] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[9] Máire O'Neill,et al. Pre-processing power traces to defeat random clocking countermeasures , 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS).
[10] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[11] Qizhi Tian,et al. On the attack of misaligned traces by power analysis methods , 2012, 2012 Seventh International Conference on Computer Engineering & Systems (ICCES).
[12] Adi Shamir,et al. Acoustic Cryptanalysis , 2017, Journal of Cryptology.
[13] W. Rosenstiel,et al. Correlation power analysis in frequency domain extended abstract , 2010 .
[14] Daniel Genkin,et al. Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation , 2015, CHES.
[15] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[16] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[17] Emmanuel Prouff,et al. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.
[18] Zhizhang Chen,et al. Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection , 2015, Journal of Cryptographic Engineering.
[19] Markus G. Kuhn,et al. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.
[20] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[21] Akashi Satoh,et al. High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching , 2006, CHES.
[22] Jasper G. J. van Woudenberg,et al. RAM: Rapid Alignment Method , 2011, CARDIS.
[23] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[24] Christof Paar,et al. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World , 2011, CHES.