Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
暂无分享,去创建一个
Ingrid Verbauwhede | François-Xavier Standaert | Benedikt Gierlichs | François-Xavier Standaert | Benedikt Gierlichs | I. Verbauwhede
[1] Stefan Mangard,et al. Power Analysis Attacks and Countermeasures , 2007, IEEE Design & Test of Computers.
[2] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[3] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[4] Eric Peeters,et al. Updates on the Security of FPGAs Against Power Analysis Attacks , 2006, ARC.
[5] L. Goubin,et al. DES and Differential Power Analysis , 1999 .
[6] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[7] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[8] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[9] Elisabeth Oswald,et al. Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings , 2008, CHES.
[10] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[11] Emmanuel Prouff,et al. DPA Attacks and S-Boxes , 2005, FSE.
[12] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[13] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[14] Lejla Batina,et al. Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip , 2008, ISC.
[15] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[16] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[17] Bart Preneel,et al. Mutual Information Analysis A Generic Side-Channel Distinguisher , 2008 .
[18] Christof Paar,et al. A Collision-Attack on AES: Combining Side Channel- and Differential-Attack , 2004, CHES.
[19] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.
[20] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[21] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[22] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[23] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[24] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[25] Robert H. Sloan,et al. Power analysis attacks and countermeasures for cryptographic algorithms , 2000 .
[26] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[27] Christof Paar,et al. Templates vs. Stochastic Methods , 2006, CHES.
[28] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[29] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[30] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .