Optimized power trace numbers in CPA attacks
暂无分享,去创建一个
Rached Tourki | Mohsen Machhout | Noura Benhadjyoussef | R. Tourki | N. Benhadjyoussef | Mohsen Machhout
[1] Shin Min Kang,et al. CMOS Digital Integrated Cir-cuits: Analysis and Design , 2002 .
[2] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[3] Thomas S. Messerges,et al. Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.
[4] FRANÇOIS-XAVIER STANDAERT,et al. An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays , 2006, Proceedings of the IEEE.
[5] Yu Han,et al. Efficient DPA Attacks on AES Hardware Implementations , 2008, Int. J. Commun. Netw. Syst. Sci..
[6] Yongdae Kim,et al. Biasing power traces to improve correlation in power analysis attacks , 2010 .
[7] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[8] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.