Far Correlation-based EMA with a precharacterized leakage model, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), pp.977-980, 2010. ,
DOI : 10.1109/DATE.2010.5456906
ElectroMagnetic Attacks Case Studies on Non-Protected and Protected Cryptographic Hardware Accelerators Special session #4 on Modeling/Simulation Validation and use of FSV, IEEE EMC, 2010. ,
An Empirical Study of the EIS Assumption in Side Channel Attacks against Hardware Implementations, COSADE, 2010. ,
Characterization of the Electro-Magnetic Side Channel in Frequency Domain, InsCrypt LNCS, pp.175-190, 2010. ,
Time Samples Correlation Attack, pp.67-72, 2011. ,
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques, 2011 Design, Automation & Test in Europe, 2011. ,
DOI : 10.1109/DATE.2011.5763163
Jean-Luc Danger , Identification of information leakage spots on a cryptographic device with an RSA processor [14001] Federal Information Processing Standards (FIPS) Publication 140-2, Security requirements for cryptographic modules, IEEE International Symposium on Electromagnetic Compatibility (EMC), pp.773-778, 2001. ,
Combined Side-Channel Attacks, pp.175-190, 2010. ,
Template Attacks in Principal Subspaces, CHES, LNCS, vol.4249, issue.69, pp.1-14, 2006. ,
DOI : 10.1007/11894063_1
Correlation Power Analysis with a Leakage Model, CHES LNCS, vol.3156, issue.29, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of Eurocrypt'97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
The Poly1305-AES Message-Authentication Code, FSE, pp.32-49, 2005. ,
Differential Power Analysis in the Presence of Hardware Countermeasures, CHES LNCS, pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
Electromagnetic Side Channels of an FPGA Implementation of AES, Cryptology ePrint Archive, Report, vol.145, 2004. ,
Towards Sound Approaches to Counteract Power-Analysis Attacks , CRYPTO, LNCS, vol.1666, 1999. ,
Statistics and Secret Leakage, Lecture Notes in Computer Science, vol.1962, pp.157-173, 2000. ,
DOI : 10.1007/3-540-45472-1_12
Meetin-the-middle and impossible differential fault analysis on aes, CHES, pp.274-291, 2011. ,
Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Computers Secutity, 1985. ,
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto- Accelerator, AFRICACRYPT, LNCS, vol.6055, pp.243-260, 2010. ,
Gang Wang, and Qianling Zhang, A modified high-radix scalable Montgomery multiplier, ISCAS, 2006. ,
Empirical comparison of side channel analysis distinguishers on DES in hardware, 2009 European Conference on Circuit Theory and Design, pp.391-394, 2009. ,
DOI : 10.1109/ECCTD.2009.5275003
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA, Cryptographic Hardware and Embedded Systems ? CHES 2005, pp.250-264, 2005. ,
DOI : 10.1007/11545262_19
Templates vs. Stochastic Methods, LNCS, vol.4249, pp.15-29, 2006. ,
DOI : 10.1007/11894063_2
Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems -CHES 2001, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
Non-invasive emi-based fault injection attack against cryptographic modules, Electromagnetic Compatibility (EMC), 2011 IEEE International Symposium on, aug, pp.763-767, 2011. ,
Comparative Power Analysis of Modular Exponentiation Algorithms, IEEE Transactions on Computers, vol.59, issue.6, pp.795-807, 2010. ,
DOI : 10.1109/TC.2009.176
Power and EM Attacks on Passive $13.56\,\textrm{MHz}$ RFID Devices, CHES '07: Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, pp.320-333, 2007. ,
DOI : 10.1007/978-3-540-74735-2_22
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching, CHES LNCS, vol.4249, pp.187-200, 2006. ,
DOI : 10.1007/11894063_15
On Second-Order Differential Power Analysis, CHES LNCS, vol.3659, pp.293-308, 2005. ,
DOI : 10.1007/11545262_22
The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.291-302, 2003. ,
DOI : 10.1007/3-540-36400-5_22
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, Information Hiding, pp.124-142, 1998. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113, 1996. ,
compromising emanations, pp.60-70, 2003. ,
DOI : 10.1007/0-387-23483-7_74
A Proposition for Correlation Power Analysis Enhancement, CHES LNCS, vol.4249, issue.66, pp.174-186, 2006. ,
DOI : 10.1007/11894063_14
URL : https://hal.archives-ouvertes.fr/hal-00133098
An overview of side channel analysis attacks, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.33-43, 2008. ,
DOI : 10.1145/1368310.1368319
Security Evaluation Against Electromagnetic Analysis at Design Time, Cryptographic Hardware and Embedded Systems ? CHES 2005, pp.280-292, 2005. ,
DOI : 10.1007/11545262_21
Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness, CT-RSA, LNCS, vol.2964, pp.222-235, 2004. ,
Investigations of Power Analysis Attacks on Smartcards, USENIX ? Smartcard'99, pp.151-162, 1999. ,
Using Second-Order Power Analysis to Attack DPA Resistant Software, CHES LNCS, vol.1965, pp.238-251, 2000. ,
Far Correlation-based EMA with a precharacterized leakage model, DATE'10, IEEE Computer Society, pp.977-980, 2010. ,
Denis Réal, and Frédéric Valette, Characterization of the Electro- Magnetic Side Channel in Frequency Domain, pp.175-190, 2010. ,
Identification of information leakage spots on a cryptographic device with an rsa processor, IEEE International Symposium on, aug, pp.773-778, 2011. ,
Power Analysis Attacks: Revealing the Secrets of Smart Cards, p.29, 2006. ,
Jean-Luc Danger, and Naofummi Homma, Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques , DATE, 2011. ,
Towards Security Limits of Embedded Hardware Devices: from Practice to Theory, 2006. ,
Evaluation of side-channel preprocessing techniques on cryptographic-enabled hf and uhf rfid-tag prototypes, Workshop on RFID Security, pp.114-127, 2008. ,
Statistical Analysis of Second Order Differential Power Analysis, IEEE Transactions on Computers, vol.58, issue.6, pp.799-811, 2009. ,
DOI : 10.1109/TC.2009.15
Power and electromagnetic analysis: Improved model, consequences and comparisons, Integration, the VLSI Journal, vol.40, issue.1, pp.52-60, 2007. ,
DOI : 10.1016/j.vlsi.2005.12.013
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1619
Power and electromagnetic analysis: Improved model, consequences and comparisons, Integration, The VLSI Journal, special issue on " Embedded Cryptographic Hardware, pp.52-60, 2007. ,
ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards, Smart Card Programming and Security (E-smart 2001) (I. Attali and T. P ,
DOI : 10.1007/3-540-45418-7_17
Introduction to the special issue on high-power electromagnetics (hpem) and intentional electromagnetic interference (iemi), Electromagnetic Compatibility, IEEE Transactions on, vol.46, issue.3, pp.314-321, 2004. ,
Differential Fault Analysis on DES Middle Rounds, Differential Fault Analysis on DES Middle Rounds, CHES, Lecture Notes in Computer Science, vol.5747, pp.457-469, 2009. ,
DOI : 10.1007/978-3-642-04138-9_32
Optical fault induction attacks, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.2-12, 2003. ,
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES, Lecture Notes in Computer Science, vol.5154, pp.411-425, 2008. ,
DOI : 10.1007/978-3-540-85053-3_26
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems ? CHES 2008, pp.411-425, 2008. ,
DOI : 10.1007/978-3-540-85053-3_26
Side-channel Attack Standard Evaluation Board, SASEBO, Project of the AIST ? RCIS (Research Center for Information Security ,
WDDL is Protected Against Setup Time Violation Attacks, FDTC, conjunction with CHES'09, pp.73-83, 2009. ,
Report on DPA and EMA attacks on FPGAs European Network of Excellence in Cryptography, Deliverable D.VAM, vol.5, 2002. ,
Correlation power analysis in frequency domain, COSADE, pp.1-3, 2010. ,
Partition vs. Comparison Side-Channel Distinguishers: An Bibliography Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against, pp.253-267, 2008. ,
ElectroMagnetic Attacks Case Studies on Non-Protected and Protected Cryptographic Hardware Accelerators Special session #4 on Modeling/Simulation Validation and use of FSV, IEEE EMC, 2008. ,
The threat of information theft by reception of electromagnetic radiation from RS-232 cables, Computers & Security, vol.9, issue.1, pp.53-58, 1990. ,
DOI : 10.1016/0167-4048(90)90157-O
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT LNCS, vol.28, issue.2, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays, Proceedings of the IEEE, pp.383-394, 2006. ,
DOI : 10.1109/JPROC.2005.862437
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures, ICISS, pp.167-179, 2007. ,
Mutual Information Analysis: How, When and Why?, CHES, LNCS, vol.5747, pp.429-443, 2009. ,
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards, Proceedings of the 18th USENIX Security Symposium, USENIX Association, pp.58-63, 2009. ,