Time-Frequency Analysis for Second-Order Attacks
暂无分享,去创建一个
Sylvain Guilley | Jean-Luc Danger | Olivier Rioul | Annelie Heuser | Shivam Bhasin | Pierre Belgarric | Nicolas Bruneau | Nicolas Debande | Zakaria Najm | O. Rioul | J. Danger | S. Guilley | Nicolas Debande | S. Bhasin | Annelie Heuser | Zakaria Najm | Nicolas Bruneau | Pierre Belgarric
[1] R. Hartley. A More Symmetrical Fourier Analysis Applied to Transmission Problems , 1942, Proceedings of the IRE.
[2] Steven G. Johnson,et al. The Design and Implementation of FFTW3 , 2005, Proceedings of the IEEE.
[3] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[4] Emmanuel Prouff,et al. A New Second-Order Side Channel Attack Based on Linear Regression , 2013, IEEE Transactions on Computers.
[5] Sylvain Guilley,et al. Overview of Dual rail with Precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors , 2009, 2009 3rd International Conference on Signals, Circuits and Systems (SCS).
[6] Jean-Sébastien Coron,et al. Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 , 2010, CHES.
[7] Stefan Mangard,et al. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers , 2006, CT-RSA.
[8] David A. Wagner,et al. Towards Efficient Second-Order Power Analysis , 2004, CHES.
[9] Catherine H. Gebotys,et al. A new correlation frequency analysis of the side channel , 2010, WESS '10.
[10] L. Goubin,et al. DES and Differential Power Analysis , 1999 .
[11] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[12] Amir Moradi,et al. On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme) , 2013, CHES.
[13] Emmanuel Prouff,et al. Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.
[14] Christophe Clavier,et al. Improved Collision-Correlation Power Analysis on First Order Protected AES , 2011, CHES.
[15] Olivier Meynard,et al. Vade mecum on side-channels attacks and countermeasures for the designer and the evaluator , 2011, 2011 6th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS).
[16] Ingrid Verbauwhede,et al. Selecting Time Samples for Multivariate DPA Attacks , 2012, CHES.
[17] Thomas Eisenbarth,et al. Correlation-Enhanced Power Analysis Collision Attack , 2010, CHES.