The EM Side???Channel(s), pp.29-45 ,
DOI : 10.1007/3-540-36400-5_4
New proofs for NMAC and HMAC: Security without collision-resistance, CRYPTO 2006, pp.602-619, 2006. ,
Keying Hash Functions for Message Authentication, CRYPTO 1996, pp.1-15, 1996. ,
DOI : 10.1007/3-540-68697-5_1
Correlation Power Analysis with a Leakage Model, pp.16-29 ,
DOI : 10.1007/978-3-540-28632-5_2
Template Attacks, pp.13-28 ,
DOI : 10.1007/3-540-36400-5_3
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions, ASIACRYPT 2006, pp.37-53, 2006. ,
DOI : 10.1007/11935230_3
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, CRYPTO 2007, pp.13-30, 2007. ,
DOI : 10.1007/978-3-540-74143-5_2
URL : https://hal.archives-ouvertes.fr/inria-00556690
Electromagnetic Analysis: Concrete Results, CHES 2001, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions, INDOCRYPT 2007, pp.393-403, 2007. ,
DOI : 10.1007/978-3-540-77026-8_31
Rfc 4306 -internet key exchange (ike v2) protocol, 2005. ,
Side channel cryptanalysis of product ciphers, ESORICS 1998, pp.97-110, 1998. ,
Side channel cryptanalysis of product ciphers, Journal of Computer Security, vol.8, issue.23, 2000. ,
Security architecture for the internet protocol, p.658092, 1998. ,
Differential Power Analysis, CRYPTO 1999, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction, pp.205-219 ,
DOI : 10.1007/978-3-540-28632-5_15
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures, WISA 2007, pp.317-332, 2008. ,
DOI : 10.1007/978-3-540-77535-5_23
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions, ACISP 2006, pp.432-443, 2006. ,
DOI : 10.1007/11780656_36
ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards, smart 2001, pp.200-210, 2001. ,
DOI : 10.1007/3-540-45418-7_17
On Authentication with HMAC and Non-random Properties, FC 2007 and USEC 2007, pp.119-133, 2007. ,
DOI : 10.1007/978-3-540-77366-5_13
A Stochastic Model for Differential Side Channel Cryptanalysis, CHES 2005, pp.30-46, 2005. ,
DOI : 10.1007/11545262_3
Rfc 2661 layer two tunneling protocol, 1999. ,
Cryptanalysis of the Hash Functions MD4 and RIPEMD, pp.1-18 ,
DOI : 10.1007/11426639_1
Finding Collisions in the Full SHA-1, pp.26-43 ,
DOI : 10.1007/11535218_2
How to Break MD5 and Other Hash Functions, pp.19-35 ,
DOI : 10.1007/11426639_2
Efficient Collision Search Attacks on SHA-0, pp.26-27 ,
DOI : 10.1007/11535218_1