Role of power grid in side channel attack and power-grid-aware secure design
暂无分享,去创建一个
Yu Zheng | Debdeep Mukhopadhyay | Swarup Bhunia | Debapriya Basu Roy | Saibal Mukhopadhyay | Xinmu Wang | Seetharam Narasimhan | Wen Yueh
[1] M. Swaminathan,et al. Impact of power-supply noise on timing in high-frequency microprocessors , 2002, Electrical Performance of Electronic Packaging,.
[2] Ingrid Verbauwhede,et al. Simulation models for side-channel information leaks , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[3] Bart Preneel,et al. Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? , 2004, CHES.
[4] David Harris,et al. CMOS VLSI Design: A Circuits and Systems Perspective , 2004 .
[5] Sylvain Guilley,et al. Differential Power Analysis Model and Some Results , 2004, CARDIS.
[6] Patrick Schaumont,et al. Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks , 2013, IEEE Transactions on Computers.
[7] Kris Tiri,et al. Side-Channel Attack Pitfalls , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[8] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[9] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[10] Stefan Mangard,et al. Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.
[11] Yiu-Fai Chan,et al. A portable digital DLL for high-speed CMOS interface circuits , 1999, IEEE J. Solid State Circuits.
[12] Nikil D. Dutt,et al. HDRL: Homogeneous Dual-Rail Logic for DPA Attack Resistive Secure Circuit Design , 2012, IEEE Embedded Systems Letters.
[13] Deog-Kyoon Jeong,et al. An all-analog multiphase delay-locked loop using a replica delay line for wide-range operation and low-jitter performance , 2000, IEEE Journal of Solid-State Circuits.
[14] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[15] Jean-Jacques Quisquater,et al. A Practical Implementation of the Timing Attack , 1998, CARDIS.
[16] Meeta Sharma Gupta,et al. Understanding Voltage Variations in Chip Multiprocessors using a Distributed Power-Delivery Network , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[17] Marc Joye,et al. On Second-Order Differential Power Analysis , 2005, CHES.
[18] Thomas S. Messerges,et al. Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.
[19] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[20] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[21] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[22] Abirami Prabhakaran. Side-Channel Analysis of Block Ciphers using CERG-GMU Interface on SASEBO-GII , 2011 .