1 |
Rivest R, Shamir A, Adleman L. "A method for obtaining digital signatures and public-key cryptosystems". Commun ACM, pp.120-126, 1978.
|
2 |
N.Koblitz, "Elliptic Curve Cryptosystem", Mathematics of Computation, ISSN 1088-6842.
|
3 |
B.D. Boer. K. Lemke, and G.Wicke, "A DPA attack against the modular reduction within a crt implementation of RSA", CHES 2002, LNCS, Vol.2523, Springer-Verlag, pp.228-243, 2002.
|
4 |
R. Novak "SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation" PKC 2002, Springer-Verlag Berlin Heidelberg 2002, LNCS 2274, pp.252-262, 2002.
|
5 |
F. Amiel, B. Feix, and K. Villegas, "Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms", SAC 2007, Springer-Verlag, pp.110-125, 2007.
|
6 |
J.Y Park, D.H Han, O. Yi, D.H Choi, "Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT", 2011 IEEE International Carnahan Conference, IEEE/IET Electronic Library (IEL), VDE VERLAG Conference Proceedings, pp.1-5, 2011.
|
7 |
R. Rao, P. Rohatgi, H. Scherzer, S. Tinguely , "Partitioning attacks: or how to rapidly clone some GSM cards", IEEE Symposium on Security and Privacy 2002. Proceedings. 2002.
|
8 |
S. Mangard, E. Oswarld, T. Popp, "Power Analysis Attacks, revealing the secret of smart cards", Springer, ISBN.0387308571, 2007. 12.
|
9 |
S. Mangard, "A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion", ICISC 2002, LNCS 2587, Springer-Verlag, pp.343-358, 2003.
|
10 |
A,J Menezes, PaulC.van Oorschot and S.A Vanstone, "Handbood Applied Cryptography", CRC press ISBN : 0-8493-8523-7, 1996.
|
11 |
P. Kocher, "Timing attacks on implementations of Diffe-Hellman, RSA, DSS and other systems", Advances in Cryptology - CRYPTO 96, Santa Barbara, Califormia, LNCS 1109, pp.103-113, 1996.
|
12 |
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis", CRYPTO 1999, LNCS 1666, Springer-Verlag, pp.388-397, 1999.
|
13 |
E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model", CHES 2004. LNCS 3156, Springer- Verlag, pp.16-29, 2004.
|
14 |
S. Chari, R. Rao, P. Rohatgi, "Template Attacks", CHES 2002, LNCS 2523, pp.13-28, 2003.
|
15 |
D. Agrawal, P. Rohatgi, and J.Rao. , "Multi-channel attacks", CHES 2003. LNCS 2779, Springer-Verlag, pp.2-16, 2003.
|
16 |
E. Oswald and P. Rohatgi, "Mutual Information Analysis", CHES 2008, LNCS 5154, Springer-Verlag, pp.426-442, 2008.
|
17 |
J. Zhou and M. Yung, "Principles on the Security of AES against First and Second-Order Differential Power Analysis" ACNS 2010, LNCS 6123, pp.168.185, 2010.
|