Threat on Physical Layer Security: Side Channel vs. Wiretap Channel
暂无分享,去创建一个
Lei Peng | Guoqing Xu | Huiyun Li | Peng Luo | Huiyun Li | Lei Peng | Guoqing Xu | Peng Luo
[1] Lin Cai,et al. Secret Key Generation and Agreement in UWB Communication Channels , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] R. Gallager. Information Theory and Reliable Communication , 1968 .
[4] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[5] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[6] Matthieu Rivain,et al. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.
[7] H. Vincent Poor,et al. Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems , 2011, IEEE Trans. Inf. Forensics Secur..
[8] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[9] G.S. Smith,et al. A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.
[10] Claude Castelluccia,et al. An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[11] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[12] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[13] Stefan Mangard. Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs , 2003 .
[14] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[15] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[16] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[17] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[18] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[19] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[20] Hisato Iwai,et al. A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property , 2008, 2008 IEEE International Symposium on Information Theory.
[21] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[22] H. Sasaoka,et al. A Private Key Sharing Scheme Based on Multipath Time Delay in UWB Systems , 2006, 2006 International Conference on Communication Technology.
[23] Simon W. Moore,et al. Security evaluation against electromagnetic analysis at design time , 2005, Tenth IEEE International High-Level Design Validation and Test Workshop, 2005..
[24] T. Ohira,et al. Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme , 2005, The European Conference on Wireless Technology, 2005..
[25] H. Sasaoka,et al. A Private Key Agreement Scheme Based on Fluactions of BER in wireless Communications , 2007, The 9th International Conference on Advanced Communication Technology.
[26] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[27] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[28] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[29] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[30] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[31] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.