Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
暂无分享,去创建一个
[1] Rached Tourki,et al. A Comparative Study of Power Consumption Models for CPA Attack , 2012 .
[2] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[3] Hoon-Jae Lee,et al. An Experimental CPA attack for Arduino Cryptographic Module and Analysis in Software-based CPA Countermeasures , 2014 .
[4] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[6] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.
[7] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[8] Alessandro Trifiletti,et al. Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits , 2010, IEEE Transactions on Circuits and Systems I: Regular Papers.
[9] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[10] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[11] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[12] Eric Peeters,et al. Power and electromagnetic analysis: Improved model, consequences and comparisons , 2007, Integr..
[13] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[14] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.