1 |
P. C. Kocher, J. Jae, and B. Jun., "Timing Attacks on Implementations of Die-Hellman, RSA, DSS, and Other Systems," CRYPTO 1996, LNCS 1109, pp. 104-113, Springer-Verlag, 1996.
|
2 |
P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," CRYPTO 1999, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
|
3 |
E. Brier, C. Clavier, F. Olivier, "Correlation power analysis with a leakage model," CHES 2004, LNCS 3156, pp. 16-29, 2004.
|
4 |
D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi., "The EM Side-Channel(s)," CHES 2002, LNCS 2524, pp. 29-45, 2003.
|
5 |
A. Moradi, MTM. Shalmani, M. Salmasizadeh, "A Generalized Method of Differential Fault Attack Against AES Cryptosystem," CHES 2006, LNCS 4249, pp. 91-100, 2006.
|
6 |
S. Mangard, E. Oswald, and T. Popp, "Power Analysis Attacks: Revealing the secrets of smart cards," pp, 82-86, Springer, 2007.
|
7 |
PN Belhumeur, JP Hespanha, DJ Kriegman, "Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection," IEEE Transactions on pattern analysis and machine intelligence, VOL 19, No. 7, 1997.
|
8 |
O. Choudary, M. G. Kuhn, "Efficient Tmeplate Attacks," CARDIS 2013, LNCS 8419, pp. 253-270, 2014.
|
9 |
Y. Souissi, M. Nassar, S. Guilley, J. Danger, F. Flament, "First Principal Components Analysis: A New Side Channel Distinguisher," ICISC 2010, LNCS 6829, pp. 407-419, 2011.
|
10 |
S. Mangard, E. Oswald, and T. Popp, "Power Analysis Attacks: Revealing the secrets of smart cards," pp, 73-79, Springer, 2007.
|
11 |
L. Batina, J. Hogenboom, Jasper G.J. van Woudenberg, "Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis," CT-RSA 2012, LNCS 7178, pp.383-397, 2012.
|
12 |
Y. Kim, H. Ko, "Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks,"ICISC 2013, 2013.
|
13 |
E. Oswald and P. Rohatgi, "Using Subsapce-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages," CHES 2008, LNCS 5154, pp. 411-425, 2008.
|