Holistic Power Side-Channel Leakage Assessment: Towards a Robust Multidimensional Metric
暂无分享,去创建一个
[1] D. Freedman,et al. Finite Exchangeable Sequences , 1980 .
[2] François Durvaux,et al. How to Certify the Leakage of a Chip? , 2014, IACR Cryptol. ePrint Arch..
[3] Elisabeth Oswald,et al. Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer , 2014, ASIACRYPT.
[4] Ingrid Verbauwhede,et al. Fast Leakage Assessment , 2017, CHES.
[5] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[6] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[7] Tim Güneysu,et al. Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms , 2016, SAC.
[8] Vincent Rijmen,et al. A Side-Channel Analysis Resistant Description of the AES S-Box , 2005, FSE.
[9] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[10] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[11] François Durvaux,et al. Towards Sound and Optimal Leakage Detection Procedure , 2017, IACR Cryptol. ePrint Arch..
[12] Sylvain Guilley,et al. NICV: Normalized inter-class variance for detection of side-channel leakage , 2014, 2014 International Symposium on Electromagnetic Compatibility, Tokyo.
[13] Ingrid Verbauwhede,et al. Revisiting Higher-Order DPA Attacks: , 2010, CT-RSA.
[14] François-Xavier Standaert,et al. How (not) to Use Welch's T-test in Side-Channel Security Evaluations , 2018, IACR Cryptol. ePrint Arch..
[15] Amir Moradi,et al. Leakage Detection with the χ 2-Test , 2018 .
[16] P. Rohatgi,et al. Test Vector Leakage Assessment ( TVLA ) methodology in practice , 2013 .
[17] Patrick Schaumont,et al. Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment , 2005, CHES.
[18] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[19] Amir Moradi,et al. Leakage assessment methodology , 2016, Journal of Cryptographic Engineering.
[20] Emmanuel Prouff,et al. Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.