1 |
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", CRYPTO' 99, LNCS 1666, pp. 388-397, 1999.
|
2 |
Y. Fei, A.A. Ding, J. Lao, and L. Zhang, "A Statistics-based Fundamental Model for Side-channel Attack Analysis", IACR ePrint 2014-152, Feb. 2011.
|
3 |
Korea Internet and Security Agency, Block Cipher Algorithm SEED, Available from https://seed.kisa.or.kr/html/egovframework/iwt/ds/ko/ref/[2]_SEED+128_Specification_english_M.pdf;jsessionid=303F153DDB99E8847A8CC919C4E4BAFE
|
4 |
M. Joye, P. Paillier, and B. Schoenmakers, "On Second-Order Differential Power Analysis", CHES 2005, LNCS 3659, pp. 293-308, 2005.
|
5 |
H. Kim, Y.I. Cho, D. Choi, D.-G. Han, and S. Hong, "Efficient Masked Implementation for SEED Based on Combined Masking", ETRI Journal, vol. 33, no. 2, pp. 267-274, Apr. 2011.
DOI
|
6 |
F.-X. Standaert, T.G. Malkin, and M. Yung, "A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks", EUROCRYPT 2009, LNCS 5479, pp. 443-461, 2009.
|
7 |
E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model", CHES 2004, LNCS 3156, pp. 16-29, 2004.
|
8 |
E. Prouff, M. Rivain, and R. Bevan, "Statistical Analysis of Second Order Differential Power Analysis", IEEE Transactions on Computers, vol. 58, no. 6, pp. 799-811, June 2009.
DOI
|
9 |
J.-W. Cho and D.-G. Han, "Security Analysis of the Masking-Shuffling based Side Channel Attack Countermeasures", International Journal of Security and Its Applications, Vol. 6, no. 4, pp. 207-214, Jan. 2012.
|
10 |
S. Mangard, E. Oswald, and T. Popp: Power Analysis Attacks - Revealing the Secrets of Smart Cards, Springer US, New York, 2007.
|
11 |
C. O'Flynn and Z. Chen, "ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research", COSADE 2014, LNCS 8622, pp. 243-260, 2014.
|
12 |
D. Goudarzi and M. Rivain, "How Fast Can Higher-Order Masking Be in Software?", EUROCRYPT 2017, LNCS 10210, pp. 567-597, 2017.
|
13 |
J. Borghoff, T. Guuneysu, E.B. Kavun, M. Knezevic, L.R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, P. Rombouts, S.S. Thomsen, and T. Yalcin, "PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications", ASIACRYPT 2012, LNCS 7658, pp. 208-225, 2012.
|