Author:
Clavier Christophe,Danger Jean-Luc,Duc Guillaume,Elaabid M. Abdelaziz,Gérard Benoît,Guilley Sylvain,Heuser Annelie,Kasper Michael,Li Yang,Lomné Victor,Nakatsu Daisuke,Ohta Kazuo,Sakiyama Kazuo,Sauvage Laurent,Schindler Werner,Stöttinger Marc,Veyrat-Charvillon Nicolas,Walle Matthieu,Wurcker Antoine
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference23 articles.
1. Brier, É., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: CHES, LNCS, vol. 3156, pp. 16–29. Springer: Cambridge (2004)
2. Chari, S., Jutla, C., Rao, J.R., Rohatgi, P.: A Cautionary Note Regarding Evaluation of AES Candidates on Smart-cards. In. In Second Advanced Encryption Standard (AES) Candidate Conference, pp. 133–147 (1999)
3. Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: CHES, LNCS, vol. 2523, pp. 13–28. Springer (2002). San Francisco Bay (Redwood City), USA
4. Elaabid, M.A., Guilley, S.: Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. In: AFRICACRYPT, LNCS, vol. 6055, pp. 243–260. Springer (2010). Stellenbosch, South Africa. doi: 10.1007/978-3-642-12678-9_15
5. Eo, Y., Eisenstadt, W., Jeong, J.Y., Kwon, O.K.: A new on-chip interconnect crosstalk model and experimental verification for CMOS VLSI circuit design. Electron Dev. IEEE Trans. 47(1), 129–140 (2000)
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献