Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
暂无分享,去创建一个
François-Xavier Standaert | Nicolas Veyrat-Charvillon | Mathieu Renauld | François-Xavier Standaert | Nicolas Veyrat-Charvillon | M. Renauld
[1] Stefan Mangard,et al. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion , 2002, ICISC.
[2] Gregory V. Bard,et al. Algebraic Cryptanalysis of the Data Encryption Standard , 2007, IMACC.
[3] Krzysztof Pietrzak,et al. A Leakage-Resilient Mode of Operation , 2009, EUROCRYPT.
[4] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[5] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[6] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[7] Hervé Chabanne,et al. Generalizing square attack using side-channels of an AES implementation on an FPGA , 2005, International Conference on Field Programmable Logic and Applications, 2005..
[8] Elisabeth Oswald,et al. An Efficient Masking Scheme for AES Software Implementations , 2005, WISA.
[9] Bart Preneel,et al. Blind Differential Cryptanalysis for Enhanced Power Attacks , 2006, Selected Areas in Cryptography.
[10] Vincent Rijmen,et al. Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings , 2008, INDOCRYPT.
[11] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[12] Andrey Bogdanov,et al. Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection , 2008, INDOCRYPT.
[13] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[14] Stefan Mangard,et al. An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.
[15] Alex Biryukov,et al. Two New Techniques of Side-Channel Cryptanalysis , 2007, CHES.
[16] Johannes A. Buchmann,et al. Block Ciphers Sensitive to Gröbner Basis Attacks , 2006, CT-RSA.
[17] Christof Paar,et al. A New Class of Collision Attacks and Its Application to DES , 2003, FSE.
[18] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks , 2009, Inscrypt.
[19] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[20] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[21] David Pointcheval. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings , 2006, CT-RSA.
[22] Alex Biryukov,et al. Block Ciphers and Systems of Quadratic Equations , 2003, FSE.
[23] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[24] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[25] Christof Paar,et al. A Collision-Attack on AES: Combining Side Channel- and Differential-Attack , 2004, CHES.
[26] Ingrid Verbauwhede,et al. Cryptographic hardware and embedded systems : CHES 2007 : 9th International Workshop, Vienna, Austria, September 10-13, 2007 : proceedings , 2007 .
[27] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[28] Moti Yung,et al. A block cipher based pseudo random number generator secure against side-channel key recovery , 2008, ASIACCS '08.
[29] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[30] Andrey Bogdanov,et al. Improved Side-Channel Collision Attacks on AES , 2007, Selected Areas in Cryptography.
[31] Frédéric Valette,et al. Enhancing Collision Attacks , 2004, CHES.
[32] Moti Yung,et al. A Block Cipher based PRNG Secure Against Side-Channel Key Recovery , 2007, IACR Cryptol. ePrint Arch..
[33] Chae Hoon Lim,et al. Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.
[34] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[35] Gregory V. Bard,et al. Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers , 2007, IACR Cryptol. ePrint Arch..
[36] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.