Author:
Ouladj Maamar,Guilley Sylvain
Publisher
Springer International Publishing
Reference64 articles.
1. Spreitzer R, Moonsamy V, Korak T, Mangard S (2018) Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun Surv Tutor 20(1):465–488
2. Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz N
3. (ed) Advances in cryptology - CRYPTO'96, 16th annual international cryptology conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings. Lecture notes in computer science, vol 1109. Springer, pp 104-113
4. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology - CRYPTO’99. Springer, pp 388–397
5. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552