Combined Distinguishers to Enhance the Accuracy and Success of Side Channel Analysis
暂无分享,去创建一个
[1] Selçuk Köse,et al. A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[2] Joydeep Ghosh,et al. Cluster Ensembles --- A Knowledge Reuse Framework for Combining Multiple Partitions , 2002, J. Mach. Learn. Res..
[3] Selçuk Köse,et al. Security-Adaptive Voltage Conversion as a Lightweight Countermeasure Against LPA Attacks , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[4] Selçuk Köse,et al. Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[5] Mircea R. Stan,et al. Bus-invert coding for low-power I/O , 1995, IEEE Trans. Very Large Scale Integr. Syst..
[6] Selçuk Köse,et al. Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures , 2018, IEEE Transactions on Emerging Topics in Computing.
[7] Günhan Dündar,et al. Noise Analysis in Switched Capacitor Amplifier Based Sensors , 2017, 2017 New Generation of CAS (NGCAS).
[8] Fathi Amsaad,et al. Duty-Cycle-Based Controlled Physical Unclonable Function , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[9] Sylvain Guilley,et al. Side-channel analysis and machine learning: A practical perspective , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[10] David R. Kaeli,et al. A Timing Side-Channel Attack on a Mobile GPU , 2018, 2018 IEEE 36th International Conference on Computer Design (ICCD).
[11] Selçuk Köse,et al. Implications of noise insertion mechanisms of different countermeasures against side-channel attacks , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).
[12] Selçuk Köse,et al. False Key-Controlled Aggressive Voltage Scaling: A Countermeasure Against LPA Attacks , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[13] Jinyi Zhang,et al. Reducing the Power Consumption of the AES S-Box by SSC , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[14] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[15] L. Benini,et al. Energy-efficient data scrambling on memory-processor interfaces , 2003, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED '03..
[16] Hossein Pishro-Nik,et al. Matching Anonymized and Obfuscated Time Series to Users’ Profiles , 2017, IEEE Transactions on Information Theory.
[17] Sylvain Guilley,et al. On the optimality and practicability of mutual information analysis in some scenarios , 2016, Cryptography and Communications.
[18] Sylvain Guilley,et al. Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory , 2014, IACR Cryptol. ePrint Arch..
[19] Selçuk Köse,et al. A New Class of Covert Channels Exploiting Power Management Vulnerabilities , 2018, IEEE Computer Architecture Letters.
[20] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[21] Christof Paar,et al. A Comparative Study of Mutual Information Analysis under a Gaussian Assumption , 2009, WISA.
[22] FRANÇOIS-XAVIER STANDAERT,et al. An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays , 2006, Proceedings of the IEEE.
[23] Claude Carlet,et al. Stochastic Collision Attack , 2017, IEEE Transactions on Information Forensics and Security.
[24] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[25] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[26] Selcuk Kose,et al. Security implications of simultaneous dynamic and leakage power analysis attacks on nanoscale cryptographic circuits , 2016 .