Author:
Ouladj Maamar,Guilley Sylvain
Publisher
Springer International Publishing
Reference17 articles.
1. Brier É, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model. In: Joye M, Quisquater J-J (eds), Cryptographic hardware and embedded systems - CHES 2004: 6th international workshop Cambridge, MA, USA, August 11–13, 2004. Proceedings. Lecture notes in computer science, vol 3156. Springer, pp 16–29
2. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
3. NIST/ITL/CSD. Data encryption standard. FIPS PUB 46-3, Oct 1999. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
4. NIST/ITL/CSD. Advanced encryption standard (AES). FIPS PUB 197, Nov 2001. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf (also ISO/IEC 18033-3:2010)
5. Guillot P, Millérioux G, Dravie B, El Mrabet N, Spectral approach for correlation power analysis. In: Hajji et al. [100], pp 238–253