Tài liệu tham khảo |
Loại |
Chi tiết |
[3] Kocher P, Jaffe J, Jun B, "Differential Power Analysis," CRYPTO 1999, LNCS 1666 Springer: Heidelberg, p 388–397, 1999 |
Sách, tạp chí |
Tiêu đề: |
Differential Power Analysis |
|
[4] Brier E, Clavier C, Olivier F, "Correlation Power Analysis with a Leakage Model," in CHES 2004, LNCS 3156 Springer: Heidelberg, 2004 |
Sách, tạp chí |
Tiêu đề: |
Correlation Power Analysis with a LeakageModel |
|
[5] Chari S, Rao JR, Rohatgi P, "Template Attacks," CHES 2002, LNCS 2523 Springer: Heidelberg, pp 13-28, 2002 |
Sách, tạp chí |
Tiêu đề: |
Template Attacks |
|
[6] G Hospodar, E De Mulder, B Gierlichs, J Vandewalle, and I Verbauwhede,"Least Squares Support Vector Machines for Side-Channel Analysis," in COSADE 2011, Darmstadt, 2011 |
Sách, tạp chí |
Tiêu đề: |
Least Squares Support Vector Machines for Side-Channel Analysis |
|
[7] A Heuser and M Zohner, "Intelligent Machine Homicide BreakingCryptographic Devices Using Support Vector," in COSADE 2012, Heidelberg, 2012 |
Sách, tạp chí |
Tiêu đề: |
Intelligent Machine Homicide BreakingCryptographic Devices Using Support Vector |
|
[8] C Clavier, J -L Danger, G Duc, M Elaabid, B Gˆerard, S Guilley, A Heuser,M Kasper, Y Li, V Lomn´e, D Nakatsu, K Ohta, K Sakiyama, L Sauvage,W Schindler, M St¨ottinger, N Veyrat-Charvillon, M Walle, and A Wurcke, "Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest," Journal of Cryptographic Engineering, vol 4, no 4, p 259–274, 2014 |
Sách, tạp chí |
Tiêu đề: |
Practical improvements of side-channel attacks on AES: feedbackfrom the 2nd DPA contest |
|
[9] Banciu, V , Oswald, E , Whitnall, C, "Reliable information extraction for single trace attacks," in Proceedings of the 2015 Design,Automation and Test in Europe Conference, San Jose, 2015 |
Sách, tạp chí |
Tiêu đề: |
Reliable information extraction for singletrace attacks |
|
[10] Liran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, and OlivierMarkowitch, "A Time Series Approach for Profling Attack," in Lecture Notes in Computer Science, Springer, 2013 |
Sách, tạp chí |
Tiêu đề: |
A Time Series Approach for Profling Attack |
|
[11] Picek, S , Heuser, A , Guilley, S, "Template attack versus Bayes classifier," J Cryptogr Eng, vol 7, no 4, pp 343-351, 2017 |
Sách, tạp chí |
Tiêu đề: |
Template attack versus Bayes classifier |
|
[14] Martinasek, Z , Zeman, V , Malina, L , Martinasek, J, "K-Nearest Neighbors Algorithm in Profiling Power Analysis Attacks," Radioengineering, vol 25, no 2, pp 365-382, 2016 |
Sách, tạp chí |
Tiêu đề: |
K-Nearest NeighborsAlgorithm in Profiling Power Analysis Attacks |
|
[15] E ệzgen, L Papachristodoulou and L Batina, "Template attacks using classification algorithms," IEEE International Symposium on Hardware Oriented Security and Trust , pp 242-247, 2016 |
Sách, tạp chí |
Tiêu đề: |
Template attacks usingclassification algorithms |
|
[16] N H Quang, "DPA, một dạng tấn công sidechannel hiệu quả," Tạp chí nghiên cứu Khoa học và Công nghệ Quân sự, 2013 |
Sách, tạp chí |
Tiêu đề: |
DPA, một dạng tấn công sidechannel hiệu quả |
|
[19] Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, and Ingrid Verbauwhede, "Power analysis of atmel cryptomemory - recovering keys from secure eeproms," in The Cryptographers’ Track at the RSA Conférence, San Francisco, CA, USA, 2012 |
Sách, tạp chí |
Tiêu đề: |
Power analysis of atmel cryptomemory - recovering keys fromsecure eeproms |
|
[20] Timo Kasper, Michael Silbermann, and Christof Paar, "Ail you can eat or breaking a real-world contactless payment System," in Financial Cryptography and Data Security, 14th International Conférence, Tenerife, Canary Islands, 2010 |
Sách, tạp chí |
Tiêu đề: |
Ail you can eat orbreaking a real-world contactless payment System |
|
[21] Timo Kasper, Michael Silbermann, and Christof Paar, "Ail you can eat or breaking a real-world contactless payment System," in Financial Cryptography and Data Security, 14th International Conférence, Tenerife, Canary Islands, 2010 |
Sách, tạp chí |
Tiêu đề: |
Ail you can eat orbreaking a real-world contactless payment System |
|
[22] David Oswald and Christof Paar, "Breaking mifare desfire MF3ICD40: power analysis and templates in the real world," in Fast Software Encryption: 12th International Workshop, 2012 |
Sách, tạp chí |
Tiêu đề: |
Breaking mifare desfire MF3ICD40: poweranalysis and templates in the real world |
|
[23] Yuanyuan Zhou, Yu Yu, Franỗois-Xavier Standaert, and Jean-JacquesQuisquater, "On the need of physical security for small embedded devices: A case study with COMP128-1 implémentations in SIM cards," in Financial Cryptography and Data Security - 17th International Conférence, Okinawa, Japan, 2013 |
Sách, tạp chí |
Tiêu đề: |
On the need of physical security for small embedded devices: Acase study with COMP128-1 implémentations in SIM cards |
|
[24] David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, and Christof Paar, "When reverse-engineering meets side-channel analysis - digitallockpicking in practice," in Selected Areas in Cryptography - SAC 2013 - 20th International Conférence, Burnaby, BC, Canada, 2013 |
Sách, tạp chí |
Tiêu đề: |
When reverse-engineering meets side-channel analysis - digitallockpicking in practice |
|
[25] David Oswald, Bastian Richter, and Christof Paar, "Side-channel attacks on the yubikey 2 one-time password generator," in Research in Attacks, Intrusions, and Defenses -16th International Symposium, RAID 2013, Rodney Bay, St Lucia, 2013 |
Sách, tạp chí |
Tiêu đề: |
Side-channel attacks on theyubikey 2 one-time password generator |
|
[27] Oswald E , Mangard S , Herbst C , Tillich S, "Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Cipher," in s In:Pointcheval D (eds) Topics in Cryptology – CT-RSA 2006 CT-RSA 2006 Lecture Notes in Computer Science, vol 3860, Springer, Berlin, Heidelberg, 2006 |
Sách, tạp chí |
Tiêu đề: |
Practical Second-Order DPAAttacks for Masked Smart Card Implementations of Block Cipher |
|