Preventing the Side-Channel Leakage of Masked AES S-Box
暂无分享,去创建一个
[1] Jovan Dj. Golic,et al. Multiplicative Masking and Power Analysis of AES , 2002, CHES.
[2] Werner Schindler,et al. A Combined Timing and Power Attack , 2002, Public Key Cryptography.
[3] Peter K. Pearson,et al. IPA: A New Class of Power Attacks , 1999, CHES.
[4] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[5] Cheng Jin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[6] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[7] Kyung-Hee Lee,et al. Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results , 2004, AES Conference.
[8] Stefan Mangard,et al. Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.
[9] Elena Trichina,et al. Simplified Adaptive Multiplicative Masking for AES , 2002, CHES.
[10] Sung-Ming Yen,et al. Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces , 2003, ACISP.
[11] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[12] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[13] Vincent Rijmen,et al. A Side-Channel Analysis Resistant Description of the AES S-Box , 2005, FSE.
[14] Stefan Mangard,et al. Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations , 2006, CHES.
[15] Johannes Blömer,et al. Provably Secure Masking of AES , 2004, IACR Cryptol. ePrint Arch..
[16] Elena Trichina,et al. Combinational Logic Design for AES SubByte Transformation on Masked Data , 2003, IACR Cryptol. ePrint Arch..
[17] Robert H. Sloan,et al. Power Analysis Attacks of Modular Exponentiation in Smartcards , 1999, CHES.
[18] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[19] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.