SMT-Based Verification of Software Countermeasures against Side-Channel Attacks
暂无分享,去创建一个
[1] Marc Joye,et al. On Second-Order Differential Power Analysis , 2005, CHES.
[2] Ingrid Verbauwhede,et al. Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs , 2012, CT-RSA.
[3] Frederik Vercauteren,et al. Practical Realisation and Elimination of an ECC-Related Software Bug Attack , 2012, CT-RSA.
[4] Patrick Schaumont,et al. Differential Power Analysis of MAC-Keccak at Any Key-Length , 2013, IWSEC.
[5] Phong Q. Nguyen,et al. Advances in Cryptology – EUROCRYPT 2013 , 2013, Lecture Notes in Computer Science.
[6] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[7] Chao Wang,et al. A satisfiability-based approach to abstraction refinement in model checking , 2003, BMC@CAV.
[8] Stephan Merz,et al. Model Checking , 2000 .
[9] Thomas S. Messerges,et al. Securing the AES Finalists Against Power Analysis Attacks , 2000, FSE.
[10] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[11] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[12] Louis Goubin,et al. A Sound Method for Switching between Boolean and Arithmetic Masking , 2001, CHES.
[13] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[14] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[15] Christof Paar,et al. KeeLoq and Side-Channel Analysis-Evolution of an Attack , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[16] Stefan Mangard,et al. An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.
[17] Chao Wang,et al. Abstraction Refinement for Large Scale Model Checking , 2006, Series on Integrated Circuits and Systems.
[18] David Novo,et al. Sleuth: Automated Verification of Software Power Analysis Countermeasures , 2013, CHES.
[19] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[20] Masakatsu Nishigaki,et al. Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings , 2011, IWSEC.
[21] Johannes Blömer,et al. Provably Secure Masking of AES , 2004, IACR Cryptol. ePrint Arch..
[22] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[23] Chao Wang,et al. Mixed symbolic representations for model checking software programs , 2006, Fourth ACM and IEEE International Conference on Formal Methods and Models for Co-Design, 2006. MEMOCODE '06. Proceedings..
[24] Elisabeth Oswald,et al. Profiling DPA: Efficacy and Efficiency Trade-Offs , 2013, CHES.
[25] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[26] Bruno Dutertre,et al. A Fast Linear-Arithmetic Solver for DPLL(T) , 2006, CAV.
[27] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[28] Emmanuel Prouff,et al. Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.