Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform
暂无分享,去创建一个
Yang Li | Yuichi Komano | Kazuo Ohta | Kazuo Sakiyama | Shin-ichi Kawamura | K. Ohta | Y. Komano | S. Kawamura | K. Sakiyama | Yang Li
[1] Daisuke Suzuki,et al. Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[3] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[4] Kouichi Itoh,et al. DPA Countermeasure Based on the "Masking Method" , 2001, ICISC.
[5] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[6] Jean-Sébastien Coron,et al. On Boolean and Arithmetic Masking against Differential Power Analysis , 2000, CHES.
[7] Patrick Schaumont,et al. Masking and Dual-Rail Logic Don't Add Up , 2007, CHES.
[8] Vincent Rijmen. Efficient Implementation of the Rijndael S-box , 2000 .
[9] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[10] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[11] Patrick Schaumont,et al. Changing the Odds Against Masked Logic , 2006, Selected Areas in Cryptography.
[12] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[13] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[14] Christophe Giraud,et al. Provably Secure S-Box Implementation Based on Fourier Transform , 2006, CHES.
[15] Pankaj Rohatgi,et al. Cryptographic Hardware and Embedded Systems Ches 2008 , 2009 .
[16] Jean-Sébastien Coron,et al. Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform , 2008, CHES.
[17] Ingrid Verbauwhede,et al. Cryptographic hardware and embedded systems : CHES 2007 : 9th International Workshop, Vienna, Austria, September 10-13, 2007 : proceedings , 2007 .
[18] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[19] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[20] Kwangjo Kim,et al. Information Security and Cryptology — ICISC 2001 , 2002, Lecture Notes in Computer Science.