An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software
暂无分享,去创建一个
[1] Jean-Sébastien Coron,et al. Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 , 2010, CHES.
[2] David G. Stork,et al. Pattern Classification , 1973 .
[3] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[4] Patel,et al. Information Security: Theory and Practice , 2008 .
[5] Jasper G. J. van Woudenberg,et al. RAM: Rapid Alignment Method , 2011, CARDIS.
[6] Stan Salvador,et al. FastDTW: Toward Accurate Dynamic Time Warping in Linear Time and Space , 2004 .
[7] Stefan Mangard,et al. Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010, CHES.
[8] Jasper G. J. van Woudenberg,et al. Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.
[9] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[10] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[11] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[12] R. Nigel Horspool,et al. Practical fast searching in strings , 1980, Softw. Pract. Exp..
[13] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[14] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[15] Esko Ukkonen,et al. Approximate Boyer-Moore String Matching , 1993, SIAM J. Comput..
[16] Michael Tunstall,et al. Efficient Use of Random Delays in Embedded Software , 2007, WISTP.
[17] Aggelos Kiayias,et al. Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings , 2011, CT-RSA.