A countermeasure for EM attack of a wireless PDA
暂无分享,去创建一个
[1] Jovan Dj. Golic,et al. Multiplicative Masking and Power Analysis of AES , 2002, CHES.
[2] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[3] Kouichi Itoh,et al. DPA Countermeasure Based on the "Masking Method" , 2001, ICISC.
[4] Lei He,et al. Leakage power modeling and reduction with data retention , 2002, ICCAD 2002.
[5] Paul Douglas,et al. Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[6] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[7] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] David A. Wagner,et al. Towards Efficient Second-Order Power Analysis , 2004, CHES.
[10] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[11] Brian R. Gladman. A Specification for Rijndael, the AES Algorithm , 2001 .
[12] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[13] Anand Raghunathan,et al. Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..
[14] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[15] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[16] Thomas S. Messerges,et al. Securing the AES Finalists Against Power Analysis Attacks , 2000, FSE.