Author:
Belleville Nicolas,Masure Loïc
Publisher
Springer Nature Switzerland
Reference28 articles.
1. Mbed TLS library. https://www.trustedfirmware.org/projects/mbed-tls/
2. Abdellatif, K.M., Couroussé, D., Potin, O., Jaillon, P.: Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures. In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2 2017, pp. 29–32. Association for Computing Machinery (2017)
3. Agosta, G., Barenghi, A., Pelosi, G.: A code morphing methodology to automate power analysis countermeasures. In: DAC, pp. 77–82 (2012)
4. Agosta, G., Barenghi, A., Pelosi, G., Scandale, M.: The MEET approach: securing cryptographic embedded software against side channel attacks. IEEE TCAD 34(8), 1320–1333 (2015)
5. Lecture Notes in Computer Science;A Amarilli,2011