Security Evaluation of Cryptographic Modules against Profiling Attacks
暂无分享,去创建一个
[1] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[2] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[3] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[4] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[5] Cécile Canovas,et al. An overview of side channel analysis attacks , 2008, ASIACCS '08.
[6] Takeshi Sugawara,et al. Profiling attack using multivariate regression analysis , 2010, IEICE Electron. Express.
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] Ingrid Verbauwhede,et al. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices , 2009, ICISC.
[9] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[10] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[11] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.