1 |
"Side Channel Attack", http://en.wikipedia.org/wiki/ Side_channel_attack
|
2 |
H.J Lee, "Basic Course for Side Channel Analysis(1)", http://kowon.dongseo.ac.kr/-hjlee/NETSEC/08DPA-EM A-lecture.pdf, 2008
|
3 |
Jem E. Berkes, "Side-Channel Monitoring of Contactless Java Cards",Thesis, Electrical Engineering and Computer Engineering, U. of Waterloo, 2008, https://ece.uwaterloo.ca/-cgebotys/JemBerkes-thesis.pdf
|
4 |
C. Gebotys, "Design of secure cryptography against the threat of power-attacks in DSP-embedded processors", Trans. On Embedded Computing Sys., Vol.3, no.1, pp92-113, 2004
DOI
|
5 |
Hagai Bar-El, "Introduction to Side Channel Attacks", http://www.discretix.com/images/stories/Introduction_to_Side_Channel_Attacks.pdf
|
6 |
K. Hashimoto, Y. Akiyama, T. Kawaguchi, K. Tahara and K. Otsuka, "High-speed Power supply System by Low Characteristic Impedance Transmission Line Using Metamaterials", ICEP 2009 Proceedings, pp891-896
|
7 |
K.Aydin, I. Bulu, et al., "Investigation of magnetic resonances for different split-ring resonator parameters and designs", New J. of Physics, 7, pp1-15,2005, 168
DOI
ScienceOn
|
8 |
CST Microwave Studio Technical Specification, http://www.cst.com/Content/Products/TechnicalSpecification.aspx?product=CST%20MWS
|
9 |
Y.J Yoon, S.M. Nam, "Room Temperature Deposition of Ceramic-Polymer Composite Thick Film by Aerosol Deposition", Ceramist, Vol.12, No.3, 22-29, June, 2009
|