Security evaluation against electromagnetic analysis at design time
暂无分享,去创建一个
[1] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[2] Catherine H. Gebotys,et al. EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.
[3] George S. Taylor,et al. Security Evaluation of Asynchronous Circuits , 2003, CHES.
[4] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[5] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[6] Michael John Sebastian Smith,et al. Application-specific integrated circuits , 1997 .
[7] Alessandro Trifiletti,et al. A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors , 2004, PATMOS.
[8] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise , 1992 .
[9] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.