EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA
暂无分享,去创建一个
[1] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[2] Jovan Dj. Golic,et al. Multiplicative Masking and Power Analysis of AES , 2002, CHES.
[3] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[4] Kouichi Itoh,et al. DPA Countermeasures by Improving the Window Method , 2002, CHES.
[5] David A. Wagner,et al. Towards Efficient Second-Order Power Analysis , 2004, CHES.
[6] Marc Joye,et al. Weierstraß Elliptic Curves and Side-Channel Attacks , 2002, Public Key Cryptography.
[7] Lei He,et al. Leakage power modeling and reduction with data retention , 2002, ICCAD 2002.
[8] Marc Joye,et al. Protections against Differential Analysis for Elliptic Curve Cryptography , 2001, CHES.
[9] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[10] Thomas S. Messerges,et al. Securing the AES Finalists Against Power Analysis Attacks , 2000, FSE.
[11] Tsuyoshi Takagi,et al. A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks , 2002, Public Key Cryptography.
[12] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[13] Marc Joye,et al. Hessian Elliptic Curves and Side-Channel Attacks , 2001, CHES.
[14] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[15] Kouichi Itoh,et al. DPA Countermeasure Based on the "Masking Method" , 2001, ICISC.
[16] Catherine H. Gebotys,et al. Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor , 2002, CHES.
[17] Louis Goubin,et al. A Sound Method for Switching between Boolean and Arithmetic Masking , 2001, CHES.
[18] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[19] Manfred Josef Aigner,et al. Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks , 2001, CHES.
[20] Catherine H. Gebotys,et al. A countermeasure for EM attack of a wireless PDA , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[21] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[22] Anand Raghunathan,et al. Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..
[23] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[24] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.