Bitslice Ciphers and Power Analysis Attacks
暂无分享,去创建一个
[1] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[2] Bruce Schneier,et al. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.
[3] Joos Vandewalle,et al. Correlation Matrices , 1994, FSE.
[4] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[5] Donald W. Davies,et al. Some Regular Properties of the DES , 1981, CRYPTO.
[6] Joos Vandewalle,et al. Weak Keys for IDEA , 1994, CRYPTO.
[7] Joos Vandewalle,et al. A New Approach to Block Cipher Design , 1993, FSE.
[8] Donald W. Davies. Some Regular Properties of the 'Data Encryption Standard' Algorithm , 1982, CRYPTO.
[9] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[10] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] david. wineland. ENCRYPTION STANDARD , 2001 .
[13] René Govaerts,et al. A New Approach Towards Block Cipher Design , 1993, FSE 1994.
[14] L. Goubin,et al. DES and Differential Power Analysis , 1999 .
[15] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[16] Ralph Howard,et al. Data encryption standard , 1987 .