Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
暂无分享,去创建一个
[1] Sylvain Guilley,et al. First Principal Components Analysis: A New Side Channel Distinguisher , 2010, ICISC.
[2] Catherine H. Gebotys,et al. EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.
[3] Rémi Gribonval,et al. Sparse representations in unions of bases , 2003, IEEE Trans. Inf. Theory.
[4] R. DeVore,et al. A Simple Proof of the Restricted Isometry Property for Random Matrices , 2008 .
[5] Michael A. Saunders,et al. Atomic Decomposition by Basis Pursuit , 1998, SIAM J. Sci. Comput..
[6] Stéphane Mallat,et al. Image compression with geometrical wavelets , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[7] Cécile Canovas,et al. Kernel Discriminant Analysis for Information Extraction in the Presence of Masking , 2016, CARDIS.
[8] Deanna Needell,et al. CoSaMP: Iterative signal recovery from incomplete and inaccurate samples , 2008, ArXiv.
[9] Emmanuel J. Candès,et al. Quantitative Robust Uncertainty Principles and Optimally Sparse Decompositions , 2004, Found. Comput. Math..
[10] Arian Maleki,et al. Coherence analysis of iterative thresholding algorithms , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[12] Leslie Ying,et al. Toeplitz Block Matrices in Compressed Sensing , 2008, ArXiv.
[13] Deanna Needell,et al. Uniform Uncertainty Principle and Signal Recovery via Regularized Orthogonal Matching Pursuit , 2007, Found. Comput. Math..
[14] Stéphane Mallat,et al. Matching pursuits with time-frequency dictionaries , 1993, IEEE Trans. Signal Process..
[15] Cécile Canovas,et al. Enhancing Dimensionality Reduction Methods for Side-Channel Attacks , 2015, CARDIS.
[16] Deanna Needell,et al. Signal Recovery From Incomplete and Inaccurate Measurements Via Regularized Orthogonal Matching Pursuit , 2007, IEEE Journal of Selected Topics in Signal Processing.
[17] François-Xavier Standaert,et al. Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.
[18] Olgica Milenkovic,et al. Subspace Pursuit for Compressive Sensing Signal Reconstruction , 2008, IEEE Transactions on Information Theory.
[19] Joel A. Tropp,et al. Algorithmic linear dimension reduction in the l_1 norm for sparse vectors , 2006, ArXiv.
[20] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[21] Jian Wang,et al. Generalized Orthogonal Matching Pursuit , 2011, IEEE Transactions on Signal Processing.
[22] Degang Sun,et al. Manifold Learning Towards Masking Implementations: A First Study , 2017, IACR Cryptol. ePrint Arch..
[23] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[24] David L Donoho,et al. Compressed sensing , 2006, IEEE Transactions on Information Theory.
[25] Jasper G. J. van Woudenberg,et al. Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis , 2012, CT-RSA.
[26] François Durvaux,et al. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces , 2016, EUROCRYPT.
[27] Emmanuel J. Candès,et al. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.
[28] Anamitra Makur,et al. Signal Recovery from Random Measurements via Extended Orthogonal Matching Pursuit , 2015, IEEE Transactions on Signal Processing.
[29] Joel A. Tropp,et al. Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.
[30] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[31] Jean-Luc Starck,et al. Sparse Solution of Underdetermined Systems of Linear Equations by Stagewise Orthogonal Matching Pursuit , 2012, IEEE Transactions on Information Theory.
[32] Minh N. Do,et al. Tree-Based Orthogonal Matching Pursuit Algorithm for Signal Reconstruction , 2006, 2006 International Conference on Image Processing.
[33] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[34] Xiaoming Huo,et al. Uncertainty principles and ideal atomic decomposition , 2001, IEEE Trans. Inf. Theory.
[35] Mike E. Davies,et al. Stagewise Weak Gradient Pursuits , 2009, IEEE Transactions on Signal Processing.
[36] Rebecca Willett,et al. Gradient projection for linearly constrained convex optimization in sparse signal recovery , 2010, 2010 IEEE International Conference on Image Processing.
[37] Joel A. Tropp,et al. Greed is good: algorithmic results for sparse approximation , 2004, IEEE Transactions on Information Theory.
[38] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[39] Amir Moradi,et al. Leakage Detection with the x2-Test , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[40] Thomas Eisenbarth,et al. Simpler, Faster, and More Robust T-Test Based Leakage Detection , 2016, COSADE.