ElectroMagnetic analysis (EMA) of software AES on Java mobile phones, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011. ,
DOI : 10.1109/WIFS.2011.6123131
URL : https://hal.archives-ouvertes.fr/emse-00651026
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations, LNCS, vol.7779, pp.1-17, 2013. ,
DOI : 10.1007/978-3-642-36095-4_1
Horizontal Collision Correlation Attack on Elliptic Curves, LNCS, vol.8282, 2014. ,
DOI : 10.1007/s12095-014-0111-8
An Attack on RSA Given a Small Fraction of the Private Key Bits, LNCS, vol.1514, pp.25-34, 1998. ,
DOI : 10.1007/3-540-49649-1_3
Bouncy Castle Crypto APIs ,
Improving the DPA Attack using Wavelet Transform. Physical Security Testing Workshop available at http://csrc.nist.gov/groups, pp.140-143 ,
Horizontal correlation analysis on exponentiation. IACR Cryptology ePrint Archive, 2010. ,
DOI : 10.1007/978-3-642-17650-0_5
URL : https://hal.archives-ouvertes.fr/inria-00540384
Electromagnetic Analysis: Concrete Results, CHES, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5990
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA, CHES, pp.250-264, 2005. ,
DOI : 10.1007/11545262_19
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Cryptology ePrint Archive, vol.857, 2013. ,
DOI : 10.1007/978-3-662-44371-2_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.432.7152
Profiling with Traceview and dmtracedump ,
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations, IACR Cryptology ePrint Archive, vol.438438, 2013. ,
Mobile Device Security: The case for side channel resistance ,
Differential Power Analysis, LNCS, vol.1666, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant, IEEE Transactions on Information Forensics and Security, vol.2, issue.4, pp.710-720 ,
DOI : 10.1109/TIFS.2007.910252
OpenSSL library documentation ,
oracle. com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html. 20. RELIC library (UNICAMP). available at https ,
Novel Applications of Wavelet Transforms based Side-Channel Analysis. Non-Invasive Attack Testing Workshop, 2011. ,
Improvement of power analysis attacks using Kalman filter, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1778-1781, 2010. ,
DOI : 10.1109/ICASSP.2010.5495428
Compromising electromagnetic emanations of wired and wireless keyboards, Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, pp.1-16, 2009. ,
Sliding Windows Succumbs to Big Mac Attack, CHES, pp.286-299, 2001. ,
DOI : 10.1007/3-540-44709-1_24
SEMA of RSA on a Smartphone, B.Sc, vol.1710, 2011. ,