Author:
Ma Peng,Wang Ze-yu,Zhong WeiDong,Wang Xu An
Publisher
Springer International Publishing
Reference24 articles.
1. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology, CRYPTO, vol. 1666 (1999)
2. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Advances in Cryptology—CRYPTO 1996. Springer, Heidelberg (1996)
3. Agrawal, D., et al.: The EM Side – Channel (s): Attacks and Assessment Methodologies (2003)
4. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Heidelberg (2004)
5. Le, T.H., Clediere, J., Serviere, C., et al.: Noise reduction in side channel attack using fourth-order cumulant. IEEE Trans. Inf. Forensics Secur. 2(4), 710–720 (2007)