Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations
暂无分享,去创建一个
Tao Wang | Xinjie Zhao | Shize Guo | Zhijie Jerry Shi | François-Xavier Standaert | Fan Zhang | Chujiao Ma | François-Xavier Standaert | Z. Shi | Shize Guo | Fan Zhang | Xin-jie Zhao | Tao Wang | Chujiao Ma
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] Tobias Achterberg,et al. SCIP: solving constraint integer programs , 2009, Math. Program. Comput..
[3] Stefan Mangard,et al. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion , 2002, ICISC.
[4] François-Xavier Standaert,et al. Security Evaluations beyond Computing Power , 2013, EUROCRYPT.
[5] Tao Wang,et al. MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation , 2012, COSADE.
[6] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[7] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[8] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA , 2009, CHES.
[9] Adi Shamir,et al. Side Channel Cube Attacks on Block Ciphers , 2009, IACR Cryptol. ePrint Arch..
[10] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[11] Andrey Bogdanov,et al. Algebraic Side-Channel Collision Attacks on AES , 2007, IACR Cryptol. ePrint Arch..
[12] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[13] Matthew J. B. Robshaw,et al. Algebraic aspects of the advanced encryption standard , 2006 .
[14] Claude Castelluccia,et al. Extending SAT Solvers to Cryptographic Problems , 2009, SAT.
[15] Avishai Wool,et al. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model , 2012, CHES.
[16] Pierre-Alain Fouque,et al. Automatic Search of Attacks on round-reduced AES and Applications , 2011, IACR Cryptol. ePrint Arch..
[17] Avishai Wool,et al. Tolerant Algebraic Side-Channel Analysis of AES , 2012, IACR Cryptol. ePrint Arch..
[18] Denis Flandre,et al. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices , 2011, EUROCRYPT.
[19] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks , 2009, Inscrypt.
[20] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[21] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[22] 由希 辻. Representation , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[23] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[24] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[25] Jing Huang,et al. Efficient Hamming weight-based side-channel cube attacks on PRESENT , 2013, J. Syst. Softw..
[26] Avishai Wool,et al. Algebraic Side-Channel Analysis in the Presence of Errors , 2010, CHES.
[27] Patrick Fay,et al. Breakthrough AES Performance with Intel ® AES New Instructions , 2010 .
[28] Annelie Heuser,et al. Improved algebraic side-channel attack on AES , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[29] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[30] Christof Paar,et al. A Collision-Attack on AES: Combining Side Channel- and Differential-Attack , 2004, CHES.
[31] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[32] François-Xavier Standaert,et al. An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..
[33] Gregory V. Bard,et al. Algebraic Cryptanalysis , 2009 .
[34] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[35] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[36] Claude Carlet,et al. Analysis of the algebraic side channel attack , 2012, Journal of Cryptographic Engineering.