Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of CRYPTO'96, ser. LNCS, pp.104-113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
DPA Contests, 2008. ,
Differential Power Analysis, Proceedings of CRYPTO'99, ser, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Electromagnetic Analysis: Concrete Results, CHES, ser. LNCS, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
One for All -All for One: Unifying Standard DPA Attacks, Cryptology ePrint Archive Report, vol.449449, 2009. ,
Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, issue.5, pp.541-552, 2002. ,
DOI : 10.1109/TC.2002.1004593
Ways to Enhance Differential Power Analysis, CHES, ser. LNCS, pp.327-342, 2002. ,
DOI : 10.1007/3-540-36552-4_23
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip, ISC, ser, pp.341-354, 2008. ,
DOI : 10.1007/978-3-540-85886-7_24
Template Attacks, CHES, ser. LNCS, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
Mutual Information Analysis, CHES, 10th International Workshop, ser. LNCS, pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Entropy-based Power Attack, " in HOST, ser, pp.1-6, 2010. ,
A Stochastic Model for Differential Side Channel Cryptanalysis, CHES, ser. LNCS, pp.30-46, 2005. ,
DOI : 10.1007/11545262_3
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, ICISC, ser. LNCS, pp.253-267, 2008. ,
DOI : 10.1007/11802839_42
Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks Complete version online, SCS, ser. IEEE, pp.1-6, 2009. ,
Power Variance Analysis breaks a masked ASIC implementation of AES, DATE. IEEE, pp.1059-1064, 2010. ,
The Variance Power Attack, COSADE, pp.4-9, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00479595
First Principal Components Analysis: A New Side Channel Distinguisher, ICISC, ser, 2010. ,
DOI : 10.1007/978-3-642-24209-0_27
Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems ? CHES 2009, pp.112-127, 2009. ,
DOI : 10.1007/978-3-642-04138-9_9
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed, AFRICACRYPT, ser, pp.403-420, 2009. ,
DOI : 10.1007/3-540-48059-5_14
KeeLoq and Side-Channel Analysis-Evolution of an Attack, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.65-69, 2009. ,
DOI : 10.1109/FDTC.2009.44
Differential Power Analysis in the Presence of Hardware Countermeasures, CHES, ser, pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques, 2011 Design, Automation & Test in Europe, 2011. ,
DOI : 10.1109/DATE.2011.5763163
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity, IEEE Transactions on Computers, vol.53, issue.6, pp.760-768, 2004. ,
DOI : 10.1109/TC.2004.13
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis, IEEE Trans. Computers, vol.49, issue.9, pp.967-970, 2000. ,
DES and Differential Power Analysis, CHES, ser. LNCS. Springer, pp.158-172, 1999. ,
An Implementation of DES and AES, Secure against Some Attacks, Proceedings of CHES'01, ser. LNCS, pp.309-318, 2001. ,
DOI : 10.1007/3-540-44709-1_26
Affine masking against higher-order side channel analysis, " in Selected Areas in Cryptography, ser. Lecture Notes in Computer Science, pp.262-280, 2010. ,
Attack on a Higher-Order Masking of the AES Based on Homographic Functions, pp.262-281, 2010. ,
DOI : 10.1007/978-3-642-17401-8_19
Using Second-Order Power Analysis to Attack DPA Resistant Software, CHES, ser. LNCS, pp.238-251, 2000. ,
DOI : 10.1007/3-540-44499-8_19
Overview of Dual Rail with Precharge Logic Styles to Thwart Implementation-Level Attacks on Hardware Cryptoprocessors, ? New Attacks and Improved Counter-Measures ?, SCS, ser. IEEE, pp.1-8, 2009. ,
Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs, 2008 Second International Conference on Secure System Integration and Reliability Improvement, pp.16-23, 2008. ,
DOI : 10.1109/SSIRI.2008.31
URL : https://hal.archives-ouvertes.fr/hal-00259153
Software Implementation of Dual-Rail Representation, COSADE, pp.73-81, 2011. ,
BCDL: A high performance balanced DPL with global precharge and without early-evaluation, " in DATE'10, pp.849-854, 2010. ,
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, ser, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
Fault Injection Resilience, " in FDTC, IEEE Computer Society, pp.51-65, 2010. ,
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow, 2009 International Conference on Reconfigurable Computing and FPGAs, pp.213-218, 2009. ,
DOI : 10.1109/ReConFig.2009.50
URL : https://hal.archives-ouvertes.fr/hal-00411843
Masking and Dual-Rail Logic Don???t Add Up, CHES, ser. LNCS, pp.95-106, 2007. ,
DOI : 10.1007/978-3-540-74735-2_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.20