Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?
暂无分享,去创建一个
Debdeep Mukhopadhyay | Abhishek Chakraborty | Bodhisatwa Mazumdar | Abhishek Chakraborty | Bodhisatwa Mazumdar | Debdeep Mukhopadhyay
[1] Antoine Joux,et al. Galois LFSR, Embedded Devices and Side Channel Weaknesses , 2006, INDOCRYPT.
[2] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[3] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[4] Abdulah Abdulah Zadeh,et al. Simple power analysis applied to nonlinear feedback shift registers , 2014, IET Inf. Secur..
[5] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[6] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[7] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[8] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[9] C. Pandu Rangan,et al. Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings , 2007, INDOCRYPT.
[10] Debdeep Mukhopadhyay,et al. LFSR Based Stream Ciphers Are Vulnerable to Power Attacks , 2007, INDOCRYPT.
[11] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[12] Tanja Lange,et al. Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings , 2006, INDOCRYPT.
[13] Elena Dubrova,et al. A Transformation From the Fibonacci to the Galois NLFSRs , 2009, IEEE Transactions on Information Theory.
[14] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[15] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[16] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[17] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.