MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation
暂无分享,去创建一个
Tao Wang | Shize Guo | Zhijie Jerry Shi | Huiying Liu | Xin-jie Zhao | Fan Zhang | Keke Ji
[1] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[2] Avishai Wool,et al. Algebraic Side-Channel Analysis in the Presence of Errors , 2010, CHES.
[3] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[4] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[5] Oliver Kullmann,et al. Theory and Applications of Satisfiability Testing - SAT 2009, 12th International Conference, SAT 2009, Swansea, UK, June 30 - July 3, 2009. Proceedings , 2009, SAT.
[6] François-Xavier Standaert,et al. Representation-, Leakage- and Cipher-Dependencies in Algebric Sidde-Channel Attacks , 2010, ACNS 2010.
[7] Byoungcheon Lee,et al. Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings , 2006, ICISC.
[8] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Joseph Bonneau,et al. Robust Final-Round Cache-Trace Attacks Against AES , 2006, IACR Cryptol. ePrint Arch..
[11] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES , 2006, IACR Cryptol. ePrint Arch..
[12] Jean-Pierre Seifert,et al. Advances on Access-Driven Cache Attacks on AES , 2006, Selected Areas in Cryptography.
[13] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[14] Cédric Lauradoux,et al. Collision attacks on processors with cache and countermeasures , 2005, WEWoRC.
[15] David Pointcheval. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings , 2006, CT-RSA.
[16] Stefan Mangard,et al. Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010, CHES.
[17] Christof Paar,et al. A New Class of Collision Attacks and Its Application to DES , 2003, FSE.
[18] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks , 2009, Inscrypt.
[19] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[20] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[21] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA , 2009, CHES.
[22] Adi Shamir,et al. Side Channel Cube Attacks on Block Ciphers , 2009, IACR Cryptol. ePrint Arch..
[23] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[24] Christophe Clavier,et al. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009, CHES.
[25] E. Freid,et al. Chloral Hydrate Sedation in Infants: Safety and Efficacy , 2010 .
[26] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[27] Michael Tunstall,et al. Cache Based Power Analysis Attacks on AES , 2006, ACISP.
[28] Stanislav Bulygin,et al. Improved Dierential Fault Analysis of Trivium , 2011 .
[29] Claude Castelluccia,et al. Extending SAT Solvers to Cryptographic Problems , 2009, SAT.
[30] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[31] Claude Carlet,et al. Analysis of the algebraic side channel attack , 2012, Journal of Cryptographic Engineering.
[32] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[33] Lars R. Knudsen,et al. Counting equations in algebraic attacks on block ciphers , 2010, International Journal of Information Security.
[34] Vittorio Zaccaria,et al. AES power attack based on induced cache miss and countermeasure , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[35] Michael Tunstall,et al. Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations , 2010, WISA.
[36] Nt Courtois,et al. Fault-Algebraic Attacks on Inner Rounds of DES , 2010 .
[37] Thomas Roche,et al. Multi-Linear cryptanalysis in Power Analysis Attacks MLPA , 2009, ArXiv.
[38] Tobias Achterberg,et al. SCIP: solving constraint integer programs , 2009, Math. Program. Comput..
[39] Lejla Batina,et al. Mutual Information Analysis: a Comprehensive Study , 2011, Journal of Cryptology.
[40] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES (Short Paper) , 2006, ICICS.
[41] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[42] Bart Preneel,et al. Blind Differential Cryptanalysis for Enhanced Power Attacks , 2006, Selected Areas in Cryptography.
[43] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[44] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[45] Elisabeth Oswald,et al. An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis , 2011, CARDIS.
[46] Ilya Kizhvatov. Error-Tolerance in Trace-Driven Cache Collision Attacks , 2011 .