1 |
K. Gandolfi, C. Mourtel, and F. Oliver, Electromagnetic Attacks: Concrete Results, in Proceedings of CHES 2001.
|
2 |
S. Mangard, E. Oswald, and T.Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer Science + Business Media, LLC., 2007.
|
3 |
P. Kocher, J. Jaffe, and B. Jun, "Introduction to Differential Power Analysis and Related attacks," White Paper, Cryptography Research, http://www.cryptography.com/dpa/technical, 1998.
|
4 |
류정춘, 한동국, 김성경, 김희석, 김태현, 이상진, "웨이블릿 기반의 차분전력분석 기법 제안", 정보보호학회논문지, 19(3), pp.27-34, 2009년 6월.
과학기술학회마을
|
5 |
Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 2001.
|
6 |
J.J. Quisquater and D. Samyde, Electromagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards, in Proceedings of e-Smart 2001.
|
7 |
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA. DSS. and Other Systems," Advances in Cryptology-Crypto, 1996, LNCS 1109, pp. 104-113, 1996.
|
8 |
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO 1999, LNCS 1666, pp. 388-397, 1999.
|
9 |
E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," CHES 2004, LNCS 3156, pp. 16-29, 2004.
|
10 |
T.H. Le, J. Clediere, C. Serviere, and J.L. Lacoume, "Noise Re-duction in Side channel Attack Using Fourth-Order Cumulant," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 710-720, Dec. 2007.
DOI
|