On Second-Order Difierential Power Analysis ?
暂无分享,去创建一个
[1] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[2] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[3] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[4] David A. Wagner,et al. Towards Efficient Second-Order Power Analysis , 2004, CHES.
[5] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[6] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[7] Jean-Sébastien Coron,et al. On Boolean and Arithmetic Masking against Differential Power Analysis , 2000, CHES.
[8] Victor H. Moll,et al. Irresistible Integrals: Symbolics, Analysis and Experiments in the Evaluation of Integrals , 2004 .
[9] Marc Joye. Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type Attacks , 2004, CARDIS.
[10] Donald E. Knuth,et al. The art of computer programming: V.1.: Fundamental algorithms , 1997 .
[11] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[12] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.