References
- P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," in Proc. of CRYPTO'96, LNCS 1109, pp. 104-113, August 18-22, 1996.
- N. Ferguson, B. Schneier and T. Kohno, Cryptography engineering: design principles and practical applications, Wiley, Hoboken, 2010.
- B. Bilgin, S. Nikova, V. Nikov, V. Rijmen and G. Stutz, "Threshold Implementations of All 33 and 44 SBoxes," in Proc. of CHES 2012, LNCS 7428, pp. 76-91, September 9-12, 2012.
- D. Canright and L. Batina, "A Very Compact "Perfectly Masked" S-Box for AES," in Proc. of ACNS 2008, LNCS 5037, pp. 446-459, June 3-6, 2008.
- C. Carlet, L. Goubin, E. Prouff, M. Quisquater and M. Rivain, "Higher-Order Masking Schemes for SBoxes," in Proc. of FSE 2012, LNCS 7549, pp. 366-384, March 19-21, 2012.
- L. Genelle, E. Prouff and M. Quisquater, "Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings," in Proc. of CHES 2011, LNCS 6917, pp. 240-255, September 28-October 1, 2011.
- Roy and S. Vivek, "Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012," in Proc. of CHES 2013, LNCS 8086, pp. 417-434, August 20-23, 2013.
- P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," in Proc. of Crypto 1999, LNCS 1666, pp. 388-397, August 15-19, 1999.
- S. Mangard, E. Oswald and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, Heidelberg, 2007.
- S. Chari, J. R. Rao and P. Rohatgi, "Template Attacks," in Proc. of CHES 2002, LNCS 2523, pp. 13-28, August 13-15, 2003.
- E. Brier, C. Clavier and F. Olivier, "Correlation Power Analysis with a Leakage Model," in Proc. of CHES 2004, LNCS 3156, pp. 16-29, August 11-13, 2004.
- B. Gierlichs, L. Batina, P. Tuyls and B. Preneel, "Mutual Information Analysis," in Proc. of CHES 2008, LNCS 5154, pp. 426-442, August 10-13, 2008.
- K. Schramm, T. Wollinger and C. Paar, "A New Class of Collision Attacks and Its Application to DES," in Proc. of FSE 2003, LNCS 2887, pp. 206-222, February 24-26, 2003.
- H. Ledig, F. Muller and F. Valette, "Enhancing Collision Attacks," in Proc. of CHES 2004, LNCS 3156, pp. 176-190, August 11-13, 2004.
- K. Schramm, G. Leander, P. Felke and C. Parr, "A Collision-Attack on AES Combining Side Channeland Differential- Attack," in Proc. of CHES 2004, LNCS 3156, pp. 163-175, August 11-13, 2004.
- Bogdanov, "Improved side-channel collision attacks on AES," in Proc. of SAC07, LNCS 4876, pp. 84-95, August 16-17, 2007.
- Bogdanov, "Multiple-Differential Side-Channel Collision Attacks on AES," in Proc. of CHES 2008, LNCS 5154, pp. 30-44, August 10-13, 2008.
- A. Sveshnikov and R. A. Silverman, Problems in probability theory, mathematical statistics and theory of random functions, Dover Publications, New York, 1979.
- Moradi, O. Mischke and T. Eisenbarth, "Correlation-enhanced power analysis collision attack," in Proc. of CHES 2010, LNCS 6225, pp. 125-139, August 17-20, 2010.
- C. Clavier, B. Feix, G. Gagnerot, M. Roussellet and V. Verneuil, "Improved Collision-Correlation Power Analysis on First Order Protected AES," in Proc. of CHES 2011, LNCS 6917, pp. 49-62, September 28-October 1, 2011.
- M.-L. Akkar, R. Bevan and P. Dischamp, "Power analysis, what is now possible..." in Proc. of ASIACRYPT 2000, LNCS 1976, pp. 489-502, December 3-7, 2000.
Cited by
- A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism vol.2018, pp.None, 2018, https://doi.org/10.1155/2018/2483619