Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)
暂无分享,去创建一个
[1] Martin Boesgaard,et al. The Rabbit Stream Cipher - Design and Security Analysis , 2004, IACR Cryptol. ePrint Arch..
[2] Emmanuel Prouff,et al. Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers , 2009, CHES.
[3] Raja Iqbal,et al. SCUR: Secure Communications in Wireless Sensor Networks using Rabbit , 2008 .
[4] Yu Chen,et al. Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices , 2010, 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing.
[5] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[6] Wieland Fischer,et al. Differential Power Analysis of Stream Ciphers , 2007, CT-RSA.
[7] Stefan Tillich,et al. Attacking State-of-the-Art Software Countermeasures-A Case Study for AES , 2008, CHES.
[8] Fengqi Yu,et al. Correlation Power Analysis Attack against Synchronous Stream Ciphers , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[9] Ilya Mironov,et al. (Not So) Random Shuffles of RC4 , 2002, IACR Cryptol. ePrint Arch..
[10] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[11] Yu Chen,et al. Self-Encryption Scheme for Data Security in Mobile Devices , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[12] Martin Boesgaard,et al. A Description of the Rabbit Stream Cipher Algorithm , 2006, RFC.