Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
暂无分享,去创建一个
Cécile Canovas | Jessy Clédière | Thanh-Ha Le | Quoc-Thinh Nguyen-Vuong | Quoc-Thinh Nguyen-Vuong | Thanh-Ha Le | J. Clédière | Cécile Canovas
[1] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.
[2] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[3] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[4] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[5] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[6] Sylvain Guilley,et al. Differential Power Analysis Model and Some Results , 2004, CARDIS.
[7] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[8] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[9] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[10] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[11] Eric Peeters,et al. Power and electromagnetic analysis: Improved model, consequences and comparisons , 2007, Integr..
[12] Pankaj Rohatgi,et al. EMpowering Side-Channel Attacks , 2001, IACR Cryptology ePrint Archive.
[13] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[14] Rita Mayer-Sommer,et al. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards , 2000, CHES.
[15] Thomas S. Messerges,et al. Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.
[16] Jean-Sébastien Coron,et al. On Boolean and Arithmetic Masking against Differential Power Analysis , 2000, CHES.
[17] Eric Peeters,et al. Updates on the Security of FPGAs Against Power Analysis Attacks , 2006, ARC.
[18] William H. Press,et al. Numerical recipes in C , 2002 .
[19] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[20] Louis Goubin,et al. A Generic Protection against High-Order Differential Power Analysis , 2003, FSE.
[21] Pankaj Rohatgi,et al. Partitioning attacks: or how to rapidly clone some GSM cards , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[22] Peter K. Pearson,et al. IPA: A New Class of Power Attacks , 1999, CHES.
[23] Régis Bevan. Estimation statistique et sécurité des cartes à puce : évaluation d'attaques DPA évoluées , 2004 .
[24] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.