Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures
- 1 January 2012
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real WorldLecture Notes in Computer Science, 2011
- Secure FPGA technologies and techniquesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- FPGA Analysis Tool: High-Level Flows for Low-Level Design Analysis in Reconfigurable ComputingPublished by Springer Science and Business Media LLC ,2009
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping SchemeLecture Notes in Computer Science, 2008
- Mutual Information AnalysisLecture Notes in Computer Science, 2008
- From the bitstream to the netlistPublished by Association for Computing Machinery (ACM) ,2008
- Trusted Design in FPGAsProceedings of the 39th conference on Design automation - DAC '02, 2007
- Identifying FPGA IP-Cores Based on Lookup Table Content AnalysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- Differential Power AnalysisLecture Notes in Computer Science, 1999