[1]
Wiener, M.J., Efficient DES Key Search", School of Computer Science, arleton University, Ottawa, Canada, TR-244, May 1994. Presented at the Rump Session of Crypto '93. [Reprinted in "Practical Cryptography for Data Internetworks, W. Stallings, editor, IEEE Computer Society Press, pp.31-79, (1996).
Google Scholar
[2]
Gael, R; Francois-Xavier, S; UCL Crypto Group, Louvain-la-Neuve . Electro technical Conference, 2002. MELECON 2002. 11th Mediterranean . Issue Date: 2002 . On page(s): 209 – 214.
Google Scholar
[3]
Yan-Ha, Hea-Sook Park, Soon-Mi Lee, Young-Whan Park and Young-Shin Han. Design and Implementation of SMS Security System for Wireless Environment. Knowledge-Based Intelligent Information and Engineering Systems . Lecture Notes in Computer Science, 2005, Volume 3682/2005, 161, DOI: 10. 1007/11552451_147.
DOI: 10.1007/11552451_147
Google Scholar
[4]
Thomas Wollinger , Jorge Guajardo, Christof Paar . ACM Special Issue Security and Embedded Systems Vol. No. March 2003, Pages ACM Transactions on Embedded Computing Systems (TECS) TECS Homepage table of contents archive . Volume 3 Issue 3, August 2004. Pages 534 – 574. Publisher ACM New York, NY, USA.
DOI: 10.1145/1015047.1015052
Google Scholar
[5]
F. -X. Standaert, S.B. Ors, J. -J. Quisquater, B. Preneel. Power Analysis Attacks against FPGA Implementations of the DES. proceedings of FPL 2004, Lecture Notes in Computer Science, vol 3203, pp.84-94, Antwerp, Belgium, September (2004).
DOI: 10.1007/978-3-540-30117-2_11
Google Scholar
[6]
Arrays F. -X. Standaert, E. Peeters, G. Rouvroy, J. -J. Quisquater. An Overview of Power Analysis Attacks Against Field Programmable Gate. PROCEEDINGS OF THE IEEE, VOL. 94, NO. 2, FEBRUARY (2006).
DOI: 10.1109/jproc.2005.862437
Google Scholar
[7]
Kootiani, A.Z.M.; Doostari, M.; Golabpour, A.; Broujerdian, M.; Dept. of Comput., Islamic Azad Univ., Shushtar. Differential Power Analysis in the Smart card by Data simulation. MMIT '08. International Conference on MultiMedia and Information Technology, 2008. 30-31 Dec. 2008. On page(s): 817 – 821.
DOI: 10.1109/mmit.2008.192
Google Scholar
[8]
An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems Larry T. McDaniel III, Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Master of Science In Electrical Engineering May 29, 2003 Blacksburg, Virginia.
Google Scholar
[9]
E Oswald, On Side-Channel Attacks and the Application of Algorithmic Countermeasures, PhD Thesis, Institute for Applied Information Processing and Communications, May 14, 2003, Graz University of Technology Austria.
Google Scholar
[10]
Francisco Rodríguez-Henríquez, N.A. Saqib, A. Díaz-Pèrez, Cetin Kaya Koc, Cryptographic Algorithms on Reconfigurable Hardware, Hardcover: 388 pages. Publisher: Springer; 1 edition (November 14, 2006).
Google Scholar
[11]
Sedat Soydan, Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells, Proceeding SECURWARE '10 Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies IEEE Computer Society Washington, DC, USA ©2010 table of contents ISBN: 978-0-7695-4095-5 doi. 10. 1109/SECURWARE. 2010. 43.
DOI: 10.1109/securware.2010.43
Google Scholar