Biasing power traces to improve correlation in power analysis attacks
暂无分享,去创建一个
Yongdae Kim | Akashi Satoh | Naofumi Homma | Takafumi Aoki | Takeshi Sugawara | Aza Aoba | Aoba-ku Sendai-shi | Yongdae Kim | T. Aoki | N. Homma | T. Sugawara | Akashi Satoh | Aza Aoba | Aoba-ku Sendai-shi
[1] C. B. Morgan. Truncated and Censored Samples, Theory and Applications , 1993 .
[2] Patrick Schaumont,et al. Changing the Odds Against Masked Logic , 2006, Selected Areas in Cryptography.
[3] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[4] Jean-Louis Lacoume,et al. A Proposition for Correlation Power Analysis Enhancement , 2006, CHES.
[5] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[6] Ingrid Verbauwhede,et al. Partition vs. Comparison Side-Channel Distinguishers , 2008 .
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] Lejla Batina,et al. Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip , 2008, ISC.
[9] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[10] H. Lilliefors. On the Kolmogorov-Smirnov Test for Normality with Mean and Variance Unknown , 1967 .