Author:
Zhao Xinjie,Zhang Fan,Guo Shize,Wang Tao,Shi Zhijie,Liu Huiying,Ji Keke
Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Lecture Notes in Computer Science;O. Acıïçmez,2006
2. Bangerter, E., Gullasch, D., Krenn, S.: Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. In: IEEE S&P 2011, pp. 490–505 (2011)
3. Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.X., Veyrat-Charvillon, N.: Mutual Information Analysis: A Comprehensive Study. Journal of Cryptology 24, 269–291 (2011)
4. Bernstein, D.J.: Cache-timing attacks on AES (2004),
http://cr.yp.to/papers.html#cachetiming
5. Berthold, T., Heinz, S., Pfetsch, M.E., Winkler, M.: SCIP C solving constraint integer programs. In: SAT 2009 (2009)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Algebraic side‐channel attacks on Trivium stream cipher;IET Communications;2024-05-02
2. Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques;2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS);2018-10
3. Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models;IEEE Transactions on Information Forensics and Security;2018-07
4. Error Tolerant ASCA on FPGA;Cloud Computing and Security;2018
5. Influence of Error on Hamming Weights for ASCA;Information Security and Cryptology;2018