Tài liệu tham khảo |
Loại |
Chi tiết |
[3] Kocher P, Jaffe J, Jun B, "Differential Power Analysis," CRYPTO 1999, LNCS 1666. Springer: Heidelberg, p. 388–397, 1999 |
Sách, tạp chí |
Tiêu đề: |
Differential Power Analysis |
|
[4] Brier E, Clavier C, Olivier F, "Correlation Power Analysis with a Leakage Model," in CHES 2004, LNCS 3156. Springer: Heidelberg, 2004 |
Sách, tạp chí |
Tiêu đề: |
Correlation Power Analysis with a Leakage Model |
|
[5] Chari S, Rao JR, Rohatgi P, "Template Attacks," CHES 2002, LNCS 2523. Springer: Heidelberg, pp. 13-28, 2002 |
Sách, tạp chí |
Tiêu đề: |
Template Attacks |
|
[6] G. Hospodar, E. De Mulder, B. Gierlichs, J. Vandewalle, and I. Verbauwhede, "Least Squares Support Vector Machines for Side-Channel Analysis," in COSADE 2011, Darmstadt, 2011 |
Sách, tạp chí |
Tiêu đề: |
Least Squares Support Vector Machines for Side-Channel Analysis |
|
[7] A. Heuser and M. Zohner, "Intelligent Machine Homicide Breaking Cryptographic Devices Using Support Vector," in COSADE 2012, Heidelberg, 2012 |
Sách, tạp chí |
Tiêu đề: |
Intelligent Machine Homicide Breaking Cryptographic Devices Using Support Vector |
|
[9] Banciu, V., Oswald, E., Whitnall, C, "Reliable information extraction for single trace attacks," in Proceedings of the 2015 Design,Automation and Test in Europe Conference, San Jose, 2015 |
Sách, tạp chí |
Tiêu đề: |
Reliable information extraction for single trace attacks |
|
[10] Liran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, and Olivier Markowitch, "A Time Series Approach for Profling Attack," in Lecture Notes in Computer Science, Springer, 2013 |
Sách, tạp chí |
Tiêu đề: |
A Time Series Approach for Profling Attack |
|
[11] Picek, S., Heuser, A., Guilley, S, "Template attack versus Bayes classifier," J. Cryptogr. Eng, vol. 7, no. 4, pp. 343-351, 2017 |
Sách, tạp chí |
Tiêu đề: |
Template attack versus Bayes classifier |
|
[12] Picek, S., Heuser, A., Jovic, A., Ludwig, S.A., Guilley, S., Jakobovic, D., Mentens, N, "Side-channel analysis and machine learning: A practical perspective," in International Joint Conference on Neural Networks, 2017 |
Sách, tạp chí |
Tiêu đề: |
Side-channel analysis and machine learning: A practical perspective |
|
[13] Hettwer, B., Gehrer, S. & Güneysu, "Applications of machine learning techniques in side-channel attacks: a survey," Journal of Cryptographic Engineering, vol. 9, no. 35, pp. 1-28, 2019 |
Sách, tạp chí |
Tiêu đề: |
Applications of machine learning techniques in side-channel attacks: a survey |
|
[14] Martinasek, Z., Zeman, V., Malina, L., Martinasek, J, "K-Nearest Neighbors Algorithm in Profiling Power Analysis Attacks," Radioengineering, vol. 25, no.2, pp. 365-382, 2016 |
Sách, tạp chí |
Tiêu đề: |
K-Nearest Neighbors Algorithm in Profiling Power Analysis Attacks |
|
[15] E. ệzgen, L. Papachristodoulou and L. Batina, "Template attacks using classification algorithms," IEEE International Symposium on Hardware Oriented Security and Trust , pp. 242-247, 2016 |
Sách, tạp chí |
Tiêu đề: |
Template attacks using classification algorithms |
|
[16] N. H. Quang, "DPA, một dạng tấn công sidechannel hiệu quả," Tạp chí nghiên cứu Khoa học và Công nghệ Quân sự, 2013 |
Sách, tạp chí |
Tiêu đề: |
DPA, một dạng tấn công sidechannel hiệu quả |
|
[17] Le.T.H, Clediere, Canovas.C, Robisson.B, Serviere.C, Lacoume.J, "A Proposition for Correlation Power Analysis Enhancement," in CHES, 2006 |
Sách, tạp chí |
Tiêu đề: |
A Proposition for Correlation Power Analysis Enhancement |
|
[18] Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani, "On the power of power analysis in the real world: A complété break of the keeloqcode hopping scheme," in 28th Annual International Cryptology Conferenee, Santa Barbara, CA, USA, 2008 |
Sách, tạp chí |
Tiêu đề: |
On the power of power analysis in the real world: A complété break of the keeloqcode hopping scheme |
|
[19] Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, and Ingrid Verbauwhede, "Power analysis of atmel cryptomemory - recovering keys from secure eeproms," in The Cryptographers’ Track at the RSA Conférence, San Francisco, CA, USA, 2012 |
Sách, tạp chí |
Tiêu đề: |
Power analysis of atmel cryptomemory - recovering keys from secure eeproms |
|
[20] Timo Kasper, Michael Silbermann, and Christof Paar, "Ail you can eat or breaking a real-world contactless payment System," in Financial Cryptography and Data Security, 14th International Conférence, Tenerife, Canary Islands, 2010 |
Sách, tạp chí |
Tiêu đề: |
Ail you can eat or breaking a real-world contactless payment System |
|
[21] Timo Kasper, Michael Silbermann, and Christof Paar, "Ail you can eat or breaking a real-world contactless payment System," in Financial Cryptography and Data Security, 14th International Conférence, Tenerife, Canary Islands, 2010 |
Sách, tạp chí |
Tiêu đề: |
Ail you can eat or breaking a real-world contactless payment System |
|
[22] David Oswald and Christof Paar, "Breaking mifare desfire MF3ICD40: power analysis and templates in the real world," in Fast Software Encryption: 12th International Workshop, 2012 |
Sách, tạp chí |
Tiêu đề: |
Breaking mifare desfire MF3ICD40: power analysis and templates in the real world |
|
[23] Yuanyuan Zhou, Yu Yu, Franỗois-Xavier Standaert, and Jean-Jacques Quisquater, "On the need of physical security for small embedded devices: A case study with COMP128-1 implémentations in SIM cards," in Financial Cryptography and Data Security - 17th International Conférence, Okinawa, Japan, 2013 |
Sách, tạp chí |
Tiêu đề: |
On the need of physical security for small embedded devices: A case study with COMP128-1 implémentations in SIM cards |
|