Towards Different Flavors of Combined Side Channel Attacks
暂无分享,去创建一个
[1] Christophe Clavier,et al. Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis , 2007 .
[2] Dakshi Agrawal,et al. Multi-channel Attacks , 2003, CHES.
[3] Josef Pieprzyk. Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings , 2010, CT-RSA.
[4] Paulo S. L. M. Barreto,et al. Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings , 2010, LATINCRYPT.
[5] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[6] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[7] Ingrid Verbauwhede,et al. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices , 2009, ICISC.
[8] Stefan Mangard,et al. One for All - All for One: Unifying Standard DPA Attacks , 2009, IACR Cryptol. ePrint Arch..
[9] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2003 , 2003, Lecture Notes in Computer Science.
[10] Sylvain Guilley,et al. Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module , 2009, TRETS.
[11] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[12] Ivan Bratko,et al. Analyzing Attribute Dependencies , 2003, PKDD.
[13] Alex K. Jones,et al. Guest Editors’ Introduction to Security in Reconfigurable Systems Design , 2009, TRETS.
[14] Bart Preneel,et al. Mutual Information Analysis A Generic Side-Channel Distinguisher , 2008 .
[15] Shlomo Yitzhaki,et al. Gini’s Mean difference: a superior measure of variability for non-normal distributions , 2003 .
[16] Jerome L. Myers,et al. Research Design and Statistical Analysis , 1991 .
[17] Lejla Batina,et al. Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip , 2008, ISC.
[18] Werner Schindler,et al. A Combined Timing and Power Attack , 2002, Public Key Cryptography.
[19] François-Xavier Standaert,et al. Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.
[20] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[21] Olivier Meynard,et al. Combined Side-Channel Attacks , 2010, WISA.
[22] Edna Schechtman,et al. A Measure of Association Based on Gini's Mean Difference , 1987 .
[23] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[24] Sylvain Guilley,et al. Silicon-level Solutions to Counteract Passive and Active Attacks , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[25] Emmanuel Prouff,et al. Theoretical and practical aspects of mutual information-based side channel analysis , 2010, Int. J. Appl. Cryptogr..
[26] Hendrik Blockeel,et al. Knowledge Discovery in Databases: PKDD 2003 , 2003, Lecture Notes in Computer Science.
[27] Naguib Lallmahomed,et al. Statistique Théorique et Appliquée , 2007 .
[28] Frederick J. Gravetter,et al. Essentials of Statistics for the Behavioral Sciences , 1991 .
[29] B. Arnold,et al. Conditional specification of statistical models , 1999 .
[30] S. Siegel,et al. Nonparametric Statistics for the Behavioral Sciences , 2022, The SAGE Encyclopedia of Research Design.
[31] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[32] Ingrid Verbauwhede,et al. Revisiting Higher-Order DPA Attacks: , 2010, CT-RSA.
[33] Elisabeth Oswald,et al. Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings , 2008, CHES.
[34] Roberto Maria Avanzi,et al. Combined Implementation Attack Resistant Exponentiation , 2010, LATINCRYPT.
[35] E. Kamen,et al. Introduction to Optimal Estimation , 1999 .