Differential Photonic Emission Analysis
暂无分享,去创建一个
Jean-Pierre Seifert | Juliane Krämer | Dmitry Nedospasov | Alexander Schlösser | J. Seifert | Alexander Schlösser | Juliane Krämer | Dmitry Nedospasov
[1] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[2] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[3] Lejla Batina,et al. Mutual Information Analysis: a Comprehensive Study , 2011, Journal of Cryptology.
[4] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[5] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[6] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[7] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[8] Villa,et al. Photon emission from hot electrons in silicon. , 1995, Physical review. B, Condensed matter.
[9] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[10] Patrick Schaumont,et al. Cryptographic Hardware and Embedded Systems – CHES 2012 , 2012, Lecture Notes in Computer Science.
[11] Frederik Vercauteren,et al. Practical Realisation and Elimination of an ECC-Related Software Bug Attack , 2012, CT-RSA.
[12] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[13] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[14] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[15] Hermann Drexler,et al. Improved Template Attacks , 2010 .
[16] Julie Ferrigno,et al. When AES blinks: introducing optical side channel , 2008, IET Inf. Secur..
[17] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[18] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[19] Sergei P. Skorobogatov,et al. Using Optical Emission Analysis for Estimating Contribution to Power Analysis , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[20] Bruno Rouzeyre,et al. When Failure Analysis Meets Side-Channel Attacks , 2010, CHES.
[21] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[22] Ingrid Verbauwhede,et al. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices , 2009, ICISC.
[23] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[24] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[25] Jean-Pierre Seifert,et al. Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us , 2012, CHES.
[26] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[27] Benedikt Heinz,et al. Localized Electromagnetic Analysis of Cryptographic Implementations , 2012, CT-RSA.
[28] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[29] Stefan Mangard,et al. Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010, CHES.
[30] Jean-Pierre Seifert,et al. Functional integrated circuit analysis , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.