Threshold Implementations Against Side-Channel Attacks and Glitches
暂无分享,去创建一个
Vincent Rijmen | Svetla Nikova | Christian Rechberger | V. Rijmen | S. Nikova | Christian Rechberger
[1] Christof Paar,et al. Higher Order Masking of the AES , 2006, CT-RSA.
[2] Kyung-Hee Lee,et al. Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results , 2004, AES Conference.
[3] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[4] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[5] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[6] Johannes Blömer,et al. Provably Secure Masking of AES , 2004, IACR Cryptol. ePrint Arch..
[7] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[8] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[9] Dakshi Agrawal,et al. Templates as Master Keys , 2005, CHES.
[10] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[11] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[12] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[13] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[14] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[15] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[16] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[17] Vincent Rijmen,et al. A Side-Channel Analysis Resistant Description of the AES S-Box , 2005, FSE.
[18] Marc Joye,et al. On Second-Order Differential Power Analysis , 2005, CHES.
[19] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[20] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[21] Wieland Fischer,et al. Masking at Gate Level in the Presence of Glitches , 2005, CHES.
[22] Patrick Schaumont,et al. Changing the Odds Against Masked Logic , 2006, Selected Areas in Cryptography.
[23] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[24] Marc Joye,et al. On Second-Order Difierential Power Analysis ? , 2005 .
[25] Elisabeth Oswald,et al. An ASIC Implementation of the AES SBoxes , 2002, CT-RSA.
[26] Stefan Mangard,et al. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers , 2006, CT-RSA.
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.
[28] Jovan Dj. Golic,et al. Multiplicative Masking and Power Analysis of AES , 2002, CHES.
[29] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[30] Stefan Mangard,et al. Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.