Differential Power Analysis, CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
The EM Side???Channel(s), Cryptographic Hardware and Embedded Systems -CHES 2002, pp.29-45, 2003. ,
DOI : 10.1007/3-540-36400-5_4
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security), 2007. ,
Differential Power Analysis in the Presence of Hardware Countermeasures, CHES '00: Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
A Countermeasure against Differential Power Analysis based on Random Delay Insertion, 2005 IEEE International Symposium on Circuits and Systems, pp.3547-3550, 2005. ,
DOI : 10.1109/ISCAS.2005.1465395
Power attack resistant cryptosystem design: a dynamic voltage and frequency switching approach, Design, Automation and Test in Europe, pp.64-69, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00181822
An Efficient Method for Random Delay Generation in Embedded Software, Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, p.170, 2009. ,
DOI : 10.1007/978-3-642-04138-9_12
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.91, issue.1, pp.91-193, 2008. ,
DOI : 10.1093/ietfec/e91-a.1.193
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure, 2007 IEEE International Symposium on Circuits and Systems, pp.1807-1810, 2007. ,
DOI : 10.1109/ISCAS.2007.378024
A countermeasure for EM attack of a wireless PDA, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, pp.544-549, 2005. ,
DOI : 10.1109/ITCC.2005.6
EM analysis of Rijndael and ECC on a wireless Javabased PDA, Cryptographic Hardware and Embedded Systems ? CHES 2005, pp.250-264, 2005. ,
Evaluation of side-channel preprocessing techniques on cryptographic-enabled HF and UHF RFID-tag prototypes, Budapest, 2008. ,
Power and EM attacks on passive RFID devices, Cryptographic Hardware and Embedded Systems ? CHES 2007, pp.320-333, 2007. ,
Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.135-152, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Attacking ECDSA-Enabled RFID Devices, Proceedings of the 7th International Conference on Applied Cryptography and Network Security, p.534, 2009. ,
DOI : 10.1007/978-3-642-01957-9_32
A Proposition for Correlation Power Analysis Enhancement, pp.174-186, 2006. ,
DOI : 10.1007/11894063_14
URL : https://hal.archives-ouvertes.fr/hal-00133098
An overview of side channel analysis attacks, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.33-43, 2008. ,
DOI : 10.1145/1368310.1368319