References
- P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Proc. Annu. Int. Cryptol. Conf., Santa Barbara, CA, USA, 1999, pp. 388-397. https://doi.org/10.1007/3-540-48405-1_25
- J. S. Coron, and I. Kizhvatov, An efficient method for random delay generation in embedded software, in Proc. Int. Workshop Cryptographic Hardw. Embedded Syst. (Lausanne, Switzerland), 2009, pp. 156-170. https://doi.org/10.1007/978-3-642-04138-9_12
- J. S. Coron, and I. Kizhvatov, Analysis and improvement of the random delay countermeasure of CHES 2009, in Proc. Int. Conf. Cryptographic Hardw. Embedded Syst., 2010, pp. 95-109.
- K. H. Boey, Y. Lu, M. O'Neill, and R. Woods, Random clock against differential power analysis, in Proc. IEEE Asia Pacific Conf. Circuits Syst. (Kuala Lumpur, Malaysia), 2010, pp. 756-759. https://doi.org/10.1109/APCCAS.2010.5774887
- M. Bucci, R. Luzzi, M. Guglielmo, and A. Trifiletti, A counter-measure against differential power analysis based on random delay insertion, in Proc.. IEEE Int. Symp. Circ. Syst. (Kobe, Japan), 2005, pp. 3547-3550. https://doi.org/10.1109/ISCAS.2005.1465395
- Y. Lu, M. O'Neill, and J. McCanny, Evaluation of random delay insertion against DPA on FPGAs, ACM Trans. Reconfigurable Technol. Syst. 4 (2010), no. 1, 1-20. https://doi.org/10.1145/1857927.1857938
- I. Levi, O. Keren, and A. Fish, Data-dependent delays as a barrier against power attacks, IEEE Trans. Circ. Syst.I: Regular Pap. 62 (2015), no. 8, 2069-2078. https://doi.org/10.1109/TCSI.2015.2452371
- G. Zarrinchian and M. S. Zamani, Combinational counters: A low overhead approach to address DPA attacks, J. Circ. Syst. Comput. 29 (2020), no. 6, 2050097. https://doi.org/10.1142/S0218126620500978
- S. Mangard, E. Oswald, and T. Popp, Power analysis attacks: Revealing the secrets of smart cards, Springer, Berlin, Germany, 2008.
- J. G. van Woudenberg, M. F. Witteman, and B. Bakker, Improving differential power analysis by elastic alignment, in Proc. Cryptographers Track RSA Conf.: Topics Cryptology (San Francisco, CA, USA), 2011, pp. 104-119. https://doi.org/10.1007/978-3-642-19074-2_8
- R. A. Muijrers, J. G. van Woudenberg, and L. Batina, RAM: Rapid alignment method, in Proc. Int. Conf. Smart Card Research Adv. Applicat, (Leuven, Belgium), 2011, pp. 266-282. https://doi.org/10.1007/978-3-642-27257-8_17
- C. Clavier, J. S. Coron, and N. Dabbous, Differential power analysis in the presence of hardware countermeasures, in Proc. Int. Workshop Cryptographic Hardw. Embedded Syst. (Worcester, MA, USA), 2000, pp. 252-263. https://doi.org/10.1007/3-540-44499-8_20
- S. Nagashima, N. Homma, Y. Imai, T. Aoki, and A. Satoh, DPA using phase-based waveform matching against randomdelay countermeasure, in Proc. IEEE Int. Symp. Circuits Syst. (New Orleans, LA, USA), 2007, pp. 1807-1810. https://doi.org/10.1109/ISCAS.2007.378024
- E. Cagli, C. Dumas, and E. Prouff, Convolutional neural networks with data augmentation against jitter-based counter-measures, in Proc. Int. Conf. Cryptographic Hardw. Embedded Syst. (Taipei, Taiwan), 2017, pp. 45-68. https://doi.org/10.1007/978-3-319-66787-4_3
- O. Schimmel, P. Duplys, E. Boehl, J. Hayek, R. Bosch, and W. Rosenstiel, Correlation power analysis in frequency domain, in Proc. COSADE 1st Int. Workshop Constructive SideChannel Anal. Secure Design, 2010, pp. 1-3.
- F. Zhang, X. Dong, B. Yang, Y. Zhou, and K. Ren, A systematic evaluation of wavelet-based attack framework on random delay countermeasures, IEEE Trans. Inform. Forensics. Secur. 15 (2019), 1407-1422. https://doi.org/10.1109/TIFS.2019.2941774
- D. B. Percival and A. T. Walden, Wavelet methods for time series analysis, Vol. 4, Cambridge University Press, 2006.