Higher-Order Side Channel Security and Mask Refreshing
暂无分享,去创建一个
Jean-Sébastien Coron | Emmanuel Prouff | Thomas Roche | Matthieu Rivain | J. Coron | E. Prouff | Matthieu Rivain | Thomas Roche
[1] Claude Carlet,et al. Higher-Order Masking Schemes for S-Boxes , 2012, FSE.
[2] Bart Preneel,et al. Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis. , 2009 .
[3] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[4] Akashi Satoh,et al. A Compact Rijndael Hardware Architecture with S-Box Optimization , 2001, ASIACRYPT.
[5] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[6] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[7] Seokhie Hong,et al. A Fast and Provably Secure Higher-Order Masking of AES S-Box , 2011, CHES.
[8] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[9] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[10] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[11] Emmanuel Prouff,et al. Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.
[12] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..