Evaluation of Correlation Power Analysis Resistance and Its Application on Asymmetric Mask Protected Data Encryption Standard Hardware
暂无分享,去创建一个
Jie Li | Bo Li | Xin Chen | Longxing Shi | Weiwei Shan | Peng Cao | Gugang Gao
[1] Stéphane Badel,et al. A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies , 2007, 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation.
[2] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[3] Guido Bertoni,et al. Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks , 2008, IEEE Transactions on Computers.
[4] Yong-Bin Kim,et al. Design and performance measurement of efficient IDEA (International Data Encryption Algorithm) crypto-hardware using novel modular arithmetic components , 2010, 2010 IEEE Instrumentation & Measurement Technology Conference Proceedings.
[5] Bart Preneel,et al. Power-Analysis Attacks on an FPGA - First Experimental Results , 2003, CHES.
[6] Dario Petri,et al. Accurate Software-Related Average Current Drain Measurements in Embedded Systems , 2007, IEEE Transactions on Instrumentation and Measurement.
[7] Minsu Choi,et al. Measurement and Evaluation of Power Analysis Attacks on Asynchronous S-Box , 2012, IEEE Transactions on Instrumentation and Measurement.
[8] Yousaf Zafar,et al. Random clocking induced DPA attack immunity in FPGAs , 2010, 2010 IEEE International Conference on Industrial Technology.
[9] Lilian Bossuet,et al. Correlated power noise generator as a low cost DPA countermeasures to secure hardware AES cipher , 2009, 2009 3rd International Conference on Signals, Circuits and Systems (SCS).
[10] Alexandre Yakovlev,et al. Improving the Security of Dual-Rail Circuits , 2004, CHES.
[11] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[12] Sylvain Guilley,et al. Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics , 2010, IEEE Transactions on Computers.
[13] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[14] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[15] Jie Li,et al. A Power Analysis Resistant DES Cryptographic Algorithm and Its Hardware Design , 2012, ICDMA.
[16] V. Piuri,et al. Computer security aspects in industrial instrumentation and measurements , 2010, 2010 IEEE Instrumentation & Measurement Technology Conference Proceedings.
[17] V. Konstantakos,et al. Measurement of Power Consumption in Digital Systems , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.
[18] Sylvain Guilley,et al. Overview of Dual rail with Precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors , 2009, 2009 3rd International Conference on Signals, Circuits and Systems (SCS).
[19] R. Menicocci,et al. Universal masking on logic gate level , 2004 .
[20] Wieslaw Winiecki,et al. Implementation of symmetric cryptography in embedded systems for secure measurement systems , 2011, 2011 IEEE International Instrumentation and Measurement Technology Conference.
[21] Dario Petri,et al. An Effective Power Consumption Measurement Procedure for Bluetooth Wireless Modules , 2007, IEEE Transactions on Instrumentation and Measurement.
[22] Piotr Bilski,et al. Multi-core implementation of the symmetric cryptography algorithms in the measurement system , 2010 .
[23] Ho Wai Wong-Lam,et al. A robust and accurate algorithm for time measurements of periodic signals based on correlation techniques , 2001, IEEE Trans. Instrum. Meas..
[24] Toni Lopez,et al. Measurement Technique for the Static Output Characterization of High-Current Power MOSFETs , 2007, IEEE Transactions on Instrumentation and Measurement.
[25] Weiwei Shan,et al. Hamming Distance Model Based Power Analysis for Cryptographic Algorithms , 2011 .