Power analysis attack: A vulnerability to smart card security
暂无分享,去创建一个
[1] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[2] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[3] Eli Biham,et al. Differential Cryptanalysis of the Full 16-Round DES , 1992, CRYPTO.
[4] Joseph Zambreno,et al. Experiments in attacking FPGA-based embedded systems using differential power analysis , 2008, 2008 IEEE International Conference on Electro/Information Technology.
[5] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.
[6] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[7] Eli Biham,et al. Differential Cryptanalysis of FEAL , 1993 .
[8] Rajesh Velegalati. Differential Power Analysis Attack on FPGA Implementation of AES , 2008 .
[9] Rita Mayer-Sommer,et al. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards , 2000, CHES.
[10] Thomas S. Messerges,et al. Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.
[11] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[12] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[13] Fengqi Yu,et al. Enhanced Correlation Power Analysis Attack on Smart Card , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[14] Robert H. Sloan,et al. Power analysis attacks and countermeasures for cryptographic algorithms , 2000 .
[15] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[16] François-Xavier Standaert,et al. Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.
[17] Christian Steger,et al. Accelerating early design phase differential power analysis using power emulation techniques , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.