1 |
P.Kocher, J.Jaffe and B.Jun, "Differential power analysis," Advances in Cryptology-CRYPTO'99, LNCS 1666, pp. 388-397, Jan. 1999
|
2 |
K. Itoh, M. Takenaka, and N. Torii, "DPA Countermeasure Based on the Masking Method," Information Security and Cryptology - ICISC 2001, LNCS 2288, pp. 440-456, Dec. 2001
|
3 |
Junki Kang, Dooho Choi, Yong-Je Choi, and Dong-Guk Han, "Secure hardware implementation of ARIA based on adaptive random masking technique," ETRI Journal, 34(1), pp. 76-86, Feb. 2012
DOI
|
4 |
S. Mangard, "A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion," Information Security and Cryptology-ICISC 2002, LNCS 2587, pp. 343-358, Nov. 2001
|
5 |
J. VanLaven, M. Brehob and K. J. Compton, "A Computationally Feasible SPA Attack on AES via Optimized search," IFIP TC11 20th International Information Security Conference, IFIP ICT 181, pp. 577-588, Jun. 2005
|
6 |
C. Clavier, D. Marion and A. Wurcker, "Simple Power Analysis on AES Key Expansion Revisited," Cryptographic Hardware and Embedded Systems - CHES 2014, LNCS 8731, pp. 279-297, Sep. 2014
|
7 |
E. Biham and A. Shamir, "Power Analysis of the Key Scheduling of the AES Candidates," Proceedings of second AES Candidate Conference, pp. 115-121, Mar. 1999
|
8 |
V. Banciu, E. Oswald and C. Whitnall, "Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks," Constructive Side-Channel Analysis and Secure Design - COSADA 2015, Revised Selected Papers. Springer, pp. 51-63, Apr. 2015
|