Author:
Ouladj Maamar,Guilley Sylvain
Publisher
Springer International Publishing
Reference36 articles.
1. Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of the 19th annual international cryptology conference on advances in cryptology, CRYPTO ’99. Springer, London, pp 388–397
2. Chari S, Rao JR, Rohatgi P (2002) Template attacks. In: Kaliski BS Jr, Koç ÇK, Paar C
3. (ed) Cryptographic hardware and embedded systems - CHES 2002, 4th international workshop, redwood shores, CA, USA, August 13-15, 2002, Revised papers. Lecture notes in computer science, vol 2523. Springer, pp 13-28
4. Werner S, (2008) Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. J Math Cryptol 2(3), 291–310, (2008) ISSN (Online) 1862–2984. ISSN (Print) 1862–2976: https://doi.org/10.1515/JMC.2008.013
5. Schindler W (2005) On the optimization of side-channel attacks by advanced stochastic methods. In: Vaudenay S (ed), Public key cryptography - PKC 2005, 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005, Proceedings. Lecture notes in computer science, vol 3386. Springer, pp 85–103
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献