1 |
P. Kocher, J. Jaffe, and B. Jun, "Introduction to differential power analysis and related attacks" White Paper, Cryptography Research, 1998.
|
2 |
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis" CRYPTO 1999, LNCS 1666, Springer-Verlag, pp.388-397, 1999.
|
3 |
O. Benoît, T. Peyrin, "Side-Channel Analysis of Six SHA-3 Candidates" CHES 2010, LNCS 6225, Springer-Verlag, pp.140 -157, 2010.
|
4 |
N. Ferguson, S. Lucks, B. Schneier, D. Whiting, M. Bellare, T. Kohno, J. Callas, and J. Walker, The skein hash function family, http://www.schneier.com/skein.html, October.
|
5 |
M. Bellare, R. Canetti and H. Krawczyk, "Keying hash functions for message authentication" CRYPTO '96, LNCS 1109, Springer-Verlag, pp.1-15, 1996.
|
6 |
National Institute of Standards and Technology, "The Keyed-Hash Message Authentication Code (HMAC)," FIPS 198, 6 Mar, 2002.
|
7 |
M. Zohner, M. Kasper, M. Stottinger, "Side channel analysis of the sha-3 finalists" Design, Automation & Test in Europe, DATE, 2012.
|