Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
暂无分享,去创建一个
[1] Nicholas J. Higham,et al. INVERSE PROBLEMS NEWSLETTER , 1991 .
[2] Mei Han An,et al. accuracy and stability of numerical algorithms , 1991 .
[3] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[4] Amir Moradi,et al. Early Propagation and Imbalanced Routing, How to Diminish in FPGAs , 2014, IACR Cryptol. ePrint Arch..
[5] Markus Kasper,et al. The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..
[6] Andrey Bogdanov,et al. Multiple-Differential Side-Channel Collision Attacks on AES , 2008, CHES.
[7] Vincent Rijmen,et al. Higher-Order Threshold Implementations , 2014, ASIACRYPT.
[8] Emmanuel Prouff,et al. Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.
[9] Sandia Report,et al. Formulas for Robust, One-Pass Parallel Computation of Covariances and Arbitrary-Order Statistical Moments , 2008 .
[10] Christof Paar,et al. Pushing the Limits: A Very Compact and a Threshold Implementation of AES , 2011, EUROCRYPT.
[11] Paul Bottinelli,et al. Computational aspects of correlation power analysis , 2016, Journal of Cryptographic Engineering.
[12] Pankaj Rohatgi,et al. Partitioning attacks: or how to rapidly clone some GSM cards , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[13] Yves Deville,et al. Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits , 2015, COSADE.
[14] P. Rohatgi,et al. A testing methodology for side channel resistance , 2011 .
[15] Ingrid Verbauwhede,et al. Selecting Time Samples for Multivariate DPA Attacks , 2012, CHES.
[16] Amir Moradi,et al. Moments-Correlating DPA , 2016, IACR Cryptol. ePrint Arch..
[17] Thomas Eisenbarth,et al. Correlation-Enhanced Power Analysis Collision Attack , 2010, CHES.
[18] Jean-Jacques Quisquater,et al. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards , 2013, Financial Cryptography.
[19] Amir Moradi,et al. Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations , 2015, CHES.
[20] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[21] François-Xavier Standaert,et al. Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device , 2015, EUROCRYPT.
[22] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.