Author:
Schneider Tobias,Moradi Amir,Güneysu Tim
Publisher
Springer Berlin Heidelberg
Reference48 articles.
1. Side-channel attack user reference architecture.
http://satoh.cs.uec.ac.jp/SAKURA/index.html
2. Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans. Comput. 52(4), 492–505 (2003)
3. Lecture Notes in Computer Science;E Biham,1997
4. Lecture Notes in Computer Science;B Bilgin,2014
5. Lecture Notes in Computer Science;B Bilgin,2014
Cited by
78 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DOMREP II;2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2024-05-06
2. On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments;IEEE Transactions on Very Large Scale Integration (VLSI) Systems;2024-05
3. The Random Fault Model;Lecture Notes in Computer Science;2024
4. SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice;Lecture Notes in Computer Science;2024
5. Fault Attacks and Countermeasures;Cryptography and Embedded Systems Security;2024