[1]
Yongbin Zhou, Dengguo Feng, Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing, Physical Security Testing Workshop, USA, (2005).
Google Scholar
[2]
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of Advances in Cryptology - CRYPTO'96, SpringerVerlag, LNCS 1109, 1996. 104-113.
DOI: 10.1007/3-540-68697-5_9
Google Scholar
[3]
Elisabeth Oswald, Stefan Mangard, Christoph Herbst, and Stefan Tillich. Practical second-order DPA attacks for masked smartcard implementations of block ciphers. In: proceeding of CT-RSA 2006, LNCS 3860, 2006. 192-207.
DOI: 10.1007/11605805_13
Google Scholar
[4]
Tiri, K., et al. Prototype IC with WDDL and differential rounting - DPA resistance assessment. In: Proceeding of Cryptographic Hardware and Embedded Systems, SpringerVerlag, LNCS 3659, 2005. 354-365.
DOI: 10.1007/11545262_26
Google Scholar
[5]
YongBin Zhou, DengGuo Feng. Side channel attacks: ten years after its publication and the impact on cryptographic module security testing. http: / eprint. iacr. org/2005/388, (2005).
Google Scholar
[6]
E. Oswald and S. Mangard. Template Attacks on Masking--Resistance is Futile. In: proceeding of CT-RSA 2007, 2007. 12-27.
DOI: 10.1007/11967668_16
Google Scholar
[7]
Paul Kocher. Differential power analysis. In: Proceeding of Advances in Cryptology-CRYPTO'99, 1999, vol. 1666, 388-397.
Google Scholar
[8]
Jean-Sébastien Coron A1 and Louis Goubin. On Boolean and Arithmetic Masking against Differential Power Analysis. CHES 2000, Lecture Notes in Computer Science, Volume 1965, Springer 2000: 231-237.
DOI: 10.1007/3-540-44499-8_18
Google Scholar