A Frequency Leakage Model and its application to CPA and DPA
暂无分享,去创建一个
Philippe Maurine | Yannick Teglia | Michel Agoyan | Sébastien Ordas | Sébastien Tiran | P. Maurine | M. Agoyan | Y. Teglia | S. Ordas | S. Tiran
[1] Alexandre Venelli,et al. Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines , 2010, WISTP.
[2] Olivier Meynard,et al. Characterization of the Electromagnetic Side Channel in Frequency Domain , 2010, Inscrypt.
[3] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[4] Satoshi Goto,et al. Correlated Noise Reduction for Electromagnetic Analysis , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Davide Pandini,et al. Clock Distribution Techniques for Low-EMI Design , 2007, PATMOS.
[6] S. M. de Jong,et al. Imaging spectrometry : basic principles and prospective applications , 2001 .
[7] Aurélien Francillon,et al. Smart Card Research and Advanced Applications , 2013, Lecture Notes in Computer Science.
[8] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[9] Sylvain Guilley,et al. Quantifying the Quality of Side-Channel Acquisitions , 2011 .
[10] Alessandro Barenghi,et al. Improving first order differential power attacks through digital signal processing , 2010, SIN.
[11] Stefan Mangard,et al. One for all - all for one: unifying standard differential power analysis attacks , 2011, IET Inf. Secur..
[12] Alessandro Barenghi,et al. Information Leakage Discovery Techniques to Enhance Secure Chip Design , 2011, WISTP.
[13] Christof Paar,et al. Improving Side-Channel Analysis with Optimal Linear Transforms , 2012, CARDIS.
[14] François-Xavier Standaert,et al. Univariate side channel attacks and leakage modeling , 2011, Journal of Cryptographic Engineering.
[15] Catherine H. Gebotys,et al. EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.
[16] Thanh-Ha Le,et al. Mutual Information Analysis under the View of Higher-Order Statistics , 2010, IWSEC.
[17] W. Rosenstiel,et al. Correlation power analysis in frequency domain extended abstract , 2010 .
[18] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[19] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[20] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[21] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[22] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[23] Philippe Maurine,et al. SCA with Magnitude Squared Coherence , 2012, CARDIS.
[24] Jean-Louis Lacoume,et al. Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant , 2007, IEEE Transactions on Information Forensics and Security.
[25] Catherine H. Gebotys,et al. A new correlation frequency analysis of the side channel , 2010, WESS '10.
[26] Amine Dehbaoui,et al. Spectral Coherence Analysis - First Experimental Results - , 2011, IACR Cryptol. ePrint Arch..