Single Trace Side Channel Analysis on NTRU Implementation
暂无分享,去创建一个
Suhri Kim | Sunghyun Jin | Soojung An | HanBit Kim | Hee-Seok Kim | Heeseok Kim | Suhri Kim | Sunghyun Jin | Hanbit Kim | Soojung An
[1] Oldrich Zmeskal,et al. Entropy of fractal systems , 2013, Comput. Math. Appl..
[2] Gorka Irazoqui Apecechea,et al. Cache Attacks Enable Bulk Key Recovery on the Cloud , 2016, CHES.
[3] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[4] William Whyte,et al. Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls , 2007, CT-RSA.
[5] Dooho Choi,et al. Power analysis attacks against NTRU and their countermeasures , 2009, INSCRYPT 2009.
[6] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[7] Amar Seeam,et al. Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies , 2018, Electronics.
[8] Zdenek Martinasek,et al. Simple Electromagnetic Analysis in Cryptography , 2012 .
[9] Emanuel Guariglia,et al. Spectral analysis of the Weierstrass-Mandelbrot function , 2017, 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech).
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[12] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[13] Emanuel Guariglia,et al. Entropy and Fractal Antennas , 2016, Entropy.
[14] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[15] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[16] Joseph H. Silverman,et al. Optimizations for NTRU , 2001 .
[17] Damián H. Zanette. Generalized Kolmogorov entropy in the dynamics of multifractal generation , 1996 .
[18] M. Berry,et al. On the Weierstrass-Mandelbrot fractal function , 1980, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[19] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .
[20] Dooho Choi,et al. Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF system* , 2014, Inscrypt 2014.
[21] An Wang,et al. First-order collision attack on protected NTRU cryptosystem , 2013, Microprocess. Microsystems.
[22] Jie Lin,et al. Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things , 2017 .
[23] Emanuel Guariglia,et al. Harmonic Sierpinski Gasket and Applications , 2018, Entropy.
[24] Xiaojin Zhao,et al. A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks , 2018, Sensors.
[25] Jean-Sébastien Coron,et al. On Boolean and Arithmetic Masking against Differential Power Analysis , 2000, CHES.
[26] Dooho Choi,et al. Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[27] William Whyte,et al. NAEP: Provable Security in the Presence of Decryption Failures , 2003, IACR Cryptol. ePrint Arch..
[28] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.