Correlation Power Analysis with a Leakage Model, CHES, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Differential Power Analysis in the Presence of Hardware Countermeasures, CHES, pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
Analysis and Improvement of the Random Delay Countermeasure of CHES, CHES, pp.95-109, 2009. ,
The Design and Implementation of FFTW3, Proceedings of the IEEE, pp.216-231, 2005. ,
DOI : 10.1109/JPROC.2004.840301
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA, CHES, pp.250-264, 2005. ,
DOI : 10.1007/11545262_19
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching, CHES, pp.187-200, 2006. ,
DOI : 10.1007/11894063_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.3061
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.91, issue.1, pp.91-193, 2008. ,
DOI : 10.1093/ietfec/e91-a.1.193
Deconvolving Protected Signals, 2009 International Conference on Availability, Reliability and Security, pp.687-694 ,
DOI : 10.1109/ARES.2009.197
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment, WISA, pp.79-93, 2009. ,
DOI : 10.1007/978-3-642-10838-9_7
Power Attacks on Secure Hardware Based on Early Propagation of Data, 12th IEEE International On-Line Testing Symposium (IOLTS'06), pp.131-138, 2006. ,
DOI : 10.1109/IOLTS.2006.49
ChristineServì ere, and Jean-Louis Lacoume. A Proposition for Correlation Power Analysis Enhancement, CHES, pp.174-186, 2006. ,
Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, Lecture Notes in Computer Science, vol.2964, pp.222-235, 2004. ,
DOI : 10.1007/978-3-540-24660-2_18
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
A new correlation frequency analysis of the side channel, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, pp.1-4, 2010. ,
DOI : 10.1145/1873548.1873552
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure, 2007 IEEE International Symposium on Circuits and Systems, pp.1807-1810, 2007. ,
DOI : 10.1109/ISCAS.2007.378024
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.491.7920
Defeating classical hardware countermeasures, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1274-1279, 2008. ,
DOI : 10.1145/1403375.1403684
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, CHES, pp.171-188, 2009. ,
DOI : 10.1007/978-3-642-04138-9_13
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009. ,
DOI : 10.1007/978-3-642-00730-9_16
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style, CHES, pp.255-269, 2006. ,
DOI : 10.1007/11894063_21
Efficient Use of Random Delays in Embedded Software, WISTP, pp.27-38, 2007. ,
DOI : 10.1007/978-3-540-30580-4_3
Improving Differential Power Analysis by Elastic Alignment ,