Side-Channel Attacks Meet Secure Network Protocols
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. DPA, Bitslicing and Masking at 1 GHz , 2015, IACR Cryptol. ePrint Arch..
[2] Josh Jae. A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter , 2007 .
[3] Zhizhang Chen,et al. Power Analysis Attacks Against IEEE 802.15.4 Nodes , 2016, COSADE.
[4] Pankaj Rohatgi,et al. Side-Channel Protections for Cryptographic Instruction Set Extensions , 2016, IACR Cryptol. ePrint Arch..
[5] Russ Housley,et al. Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP) , 2004, RFC.
[6] Radha Poovendran,et al. The AES-CMAC Algorithm , 2006, RFC.
[7] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .
[8] Morris J. Dworkin. SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .
[9] Alex Biryukov,et al. Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice , 2016, ACNS.
[10] Praveen Kumar Vadnala. Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers , 2017, CT-RSA.
[11] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[12] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[13] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[14] Russ Housley,et al. Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP) , 2005, RFC.
[15] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[16] Stefan Mangard,et al. ARMageddon: Cache Attacks on Mobile Devices , 2015, USENIX Security Symposium.
[17] Peter Schwabe,et al. All the AES You Need on Cortex-M3 and M4 , 2016, SAC.
[18] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[19] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[20] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[21] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.