The Research of Correlation Power Analysis on a AES Implementations
暂无分享,去创建一个
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[3] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[4] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[5] Shin Min Kang,et al. CMOS Digital Integrated Cir-cuits: Analysis and Design , 2002 .
[6] Christophe Clavier,et al. Optimal Statistical Power Analysis , 2003, IACR Cryptol. ePrint Arch..
[7] Bart Preneel,et al. Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? , 2004, CHES.
[8] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[9] FRANÇOIS-XAVIER STANDAERT,et al. An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays , 2006, Proceedings of the IEEE.
[10] Stefan Mangard,et al. An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.
[11] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[12] Yu Han,et al. Efficient DPA Attacks on AES Hardware Implementations , 2008, Int. J. Commun. Netw. Syst. Sci..
[13] Yongdae Kim,et al. Biasing power traces to improve correlation in power analysis attacks , 2010 .
[14] Olivier Meynard,et al. Time Samples Correlation Attack , 2011 .