Author:
Ouladj Maamar,Guilley Sylvain
Publisher
Springer International Publishing
Reference48 articles.
1. Standaert F-X, Malkin T, Yung M (2009) A unified framework for the analysis of side-channel key recovery attacks. In: EUROCRYPT, April 26–30 2009, Cologne, Germany. LNCS, vol 5479. Springer, pp 443–461
2. Chari S, Rao JR, Rohatgi P (2002) Template attacks. In: Kaliski BS, Jr., Koç ÇK, Paar C (eds) Cryptographic hardware and embedded systems - CHES 2002, 4th international workshop, Redwood Shores, CA, USA, August 13–15, 2002, Revised papers. Lecture notes in computer science, vol 2523. Springer, pp 13–28
3. Schindler W (2005) On the optimization of side-channel attacks by advanced stochastic methods. In: Vaudenay S
4. (ed) Public key cryptography - PKC 2005, 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings. Lecture notes in computer science, vol 3386. Springer, pp 85-103
5. Masure L, Dumas C, Prouff E (2019) Gradient visualization for general characterization in profiling attacks. In: Constructive side-channel analysis and secure design - 10th international workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings, pp 145–167
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献