Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis
暂无分享,去创建一个
[1] Srinivas Vivek,et al. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 , 2013, CHES.
[2] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[3] Lejla Batina,et al. A Very Compact "Perfectly Masked" S-Box for AES , 2008, ACNS.
[4] Andrey Bogdanov,et al. Beyond the Limits of DPA: Combined Side-Channel Collision Attacks , 2012, IEEE Transactions on Computers.
[5] Elisabeth Oswald,et al. Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings , 2008, CHES.
[6] Andrey Bogdanov,et al. Multiple-Differential Side-Channel Collision Attacks on AES , 2008, CHES.
[7] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[8] Elisabeth Oswald,et al. Profiling DPA: Efficacy and Efficiency Trade-Offs , 2013, CHES.
[9] Christof Paar,et al. A New Class of Collision Attacks and Its Application to DES , 2003, FSE.
[10] 陈凡,et al. Institute of Microelectronics, Tsinghua University, Beijing 100084, China , 2013 .
[11] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[12] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[13] Thomas Eisenbarth,et al. Correlation-Enhanced Power Analysis Collision Attack , 2010, CHES.
[14] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[15] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[16] Claude Carlet,et al. Higher-Order Masking Schemes for S-Boxes , 2012, FSE.
[17] Christof Paar,et al. A Collision-Attack on AES: Combining Side Channel- and Differential-Attack , 2004, CHES.
[18] Andrey Bogdanov,et al. Improved Side-Channel Collision Attacks on AES , 2007, Selected Areas in Cryptography.
[19] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[20] Vincent Rijmen,et al. Threshold Implementations of all 3x3 and 4x4 S-boxes , 2012, IACR Cryptol. ePrint Arch..
[21] Bart Preneel,et al. Mutual Information Analysis A Generic Side-Channel Distinguisher , 2008 .
[22] Christophe Clavier,et al. Improved Collision-Correlation Power Analysis on First Order Protected AES , 2011, CHES.
[23] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[24] Patrick Schaumont,et al. Cryptographic Hardware and Embedded Systems – CHES 2012 , 2012, Lecture Notes in Computer Science.
[25] Michaël Quisquater,et al. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings , 2011, CHES.
[26] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[27] Stefan Mangard,et al. Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010, CHES.
[28] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[29] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .