Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection, INDOCRYPT, pp.251-265, 2008. ,
DOI : 10.1007/978-3-540-77360-3_6
Correlation Power Analysis with a Leakage Model, pp.16-29 ,
DOI : 10.1007/978-3-540-28632-5_2
Analysis of the algebraic side channel attack, Journal of Cryptographic Engineering, vol.24, issue.1, pp.45-62, 2012. ,
DOI : 10.1007/s13389-012-0028-0
URL : https://hal.archives-ouvertes.fr/hal-00777829
Template Attacks, CHES, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models, Lecture Notes in Computer Science, vol.7771, pp.123-140, 2012. ,
DOI : 10.1007/978-3-642-37288-9_9
Building a Side Channel Based Disassembler, Transactions on Computational Science, vol.10, pp.78-99, 2010. ,
DOI : 10.1007/978-3-642-17499-5_4
Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, pp.21-28, 1962. ,
DOI : 10.1109/TIT.1962.1057683
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting, Prouff and Schaumont, pp.175-192 ,
DOI : 10.1007/978-3-642-33027-8_11
Mutual Information Analysis, CHES, pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations, IEEE Transactions on Information Forensics and Security, vol.9, issue.6, pp.999-1014, 2014. ,
DOI : 10.1109/TIFS.2014.2315534
Hidden Markov Model Cryptanalysis, CHES, pp.17-34, 2003. ,
DOI : 10.1007/978-3-540-45238-6_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.5945
Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999. ,
Information theory, inference, and learning algorithms, 2003. ,
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion, Lecture Notes in Computer Science, vol.2587, pp.343-358, 2002. ,
DOI : 10.1007/3-540-36552-4_24
One for all ??? all for one: unifying standard differential power analysis attacks, IET Information Security, vol.5, issue.2, pp.100-110, 2011. ,
DOI : 10.1049/iet-ifs.2010.0096
Improved algebraic side-channel attack on AES, Journal of Cryptographic Engineering, vol.3, issue.3, pp.139-156, 2013. ,
Algebraic Side-Channel Analysis in the Presence of Errors, CHES, pp.428-442, 2010. ,
DOI : 10.1007/978-3-642-15031-9_29
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model, Prouff and Schaumont, pp.140-154 ,
DOI : 10.1007/978-3-642-33027-8_9
Algebraic Side-Channel Attacks, Information Security and Cryptology -5th International Conference, pp.393-410, 2009. ,
DOI : 10.1007/978-3-642-16342-5_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.8043
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA, CHES, pp.97-111, 2009. ,
DOI : 10.1007/978-3-642-04138-9_8
A Stochastic Model for Differential Side Channel Cryptanalysis, CHES, pp.30-46, 2005. ,
DOI : 10.1007/11545262_3
A Collision-Attack on AES, Joye and Quisquater [11], pp.163-175 ,
DOI : 10.1007/978-3-540-28632-5_12
A New Class of Collision Attacks and Its Application to DES, Lecture Notes in Computer Science, vol.2887, pp.206-222, 2003. ,
DOI : 10.1007/978-3-540-39887-5_16
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Lecture Notes in Computer Science, vol.28, issue.2, pp.443-461 ,
DOI : 10.1007/978-3-540-85053-3_26
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography, pp.390-406, 2012. ,
DOI : 10.1007/978-3-642-35999-6_25
Security Evaluations beyond Computing Power, Lecture Notes in Computer Science, vol.7881, pp.126-141, 2013. ,
DOI : 10.1007/978-3-642-38348-9_8
URL : http://hdl.handle.net/2078.1/133720
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers, Lecture Notes in Computer Science, vol.7864, pp.62-79, 2013. ,
DOI : 10.1007/978-3-642-40026-1_5