Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware
暂无分享,去创建一个
[1] S. K. Nandy,et al. REDEFINE: Runtime reconfigurable polymorphic ASIC , 2009, TECS.
[2] Vincent Rijmen,et al. Threshold Implementations Against Side-Channel Attacks and Glitches , 2006, ICICS.
[3] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[4] François-Xavier Standaert,et al. Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking) , 2008, IET Inf. Secur..
[5] Tim Güneysu,et al. Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[6] Ranjani Narayan,et al. A Flexible Crypto-system Based upon the REDEFINE Polymorphic ASIC Architecture , 2012 .
[7] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[8] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[9] Emmanuel Prouff,et al. Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.
[10] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[11] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[12] François-Xavier Standaert,et al. How (not) to Use Welch's T-test in Side-Channel Security Evaluations , 2018, IACR Cryptol. ePrint Arch..
[13] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[14] Alexandre Yakovlev,et al. Design and analysis of dual-rail circuits for security applications , 2005, IEEE Transactions on Computers.
[15] Ingrid Verbauwhede,et al. Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration , 2008, CHES.
[16] Amir Moradi,et al. Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations , 2015, CHES.
[17] Hendra Guntur,et al. Side-channel AttacK User Reference Architecture board SAKURA-G , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[18] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[19] Frank M. Brown,et al. Boolean reasoning - the logic of boolean equations , 1990 .