A Cluster Correlation power analysis against double blinding exponentiation
Tài liệu tham khảo
Kocher, 1996, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, 1109, 104
Fouque, 2003, The doubling attack why upwards is better than downwards, 2779, 269
Yen, 2005, Power analysis by exploiting chosen message and internal collisions-vulnerability of checking mechanism for RSA-decryption, 183
Shamir, 2010, Comparative power analysis of modular exponentiation algorithms, IEEE Trans Comput, 59, 795, 10.1109/TC.2009.176
Kocher, 1999, Differential power analysis, 1666
Messerges, 1999, Investigations of power analysis attacks on smartcards, 151
Zhang, 2018, A highly effective dpa attack method based on genetic algorithm, Comput Mater Continua, 56, 325
Amiel, 2007, Power analysis for secret recovering and reverse engineering of public key algorithms, 4876, 110
Coron, 2003, Resistance against differential power analysis for elliptic curve cryptosystems, 1717, 292
Clavier, 2001, Universal exponentiation algorithm: a first step towards provable spa-resistance, 2162, 300
Kim, 2004, A secure and practical crt-based RSA to resist side channel attacks, 3043, 150
Zhang, 2019, Frequency offset-based ring oscillator physical unclonable function, IEEE Trans Multi-Scale Comput Syst, 4, 711, 10.1109/TMSCS.2018.2877737
Mamiya, 2004, Efficient countermeasure against RPA, DPA, and SPA, 3156, 343
Ha, 2008, A new crt-rsa scheme resistant to power analysis and fault attack, 351
Witteman, 2011, Defeating rsa multiply-always and message blinding countermeasures, 6558, 77
Kim, 2010, Practical second-order correlation power analysis on the message blinding method and its novel counter-measure for RSA, ETRI J, 32, 102, 10.4218/etrij.10.0109.0249
Clavier, 2010, Horizontal correlation analysis on exponentiation, 6476, 46
Bauer, 2012, Attacking exponent blinding in rsa without crt, 7275, 82
Bauer, 2013, Horizontal and vertical side channel attacks against secure rsa implementations, 7779, 1
Akalp Kuzu, 2014, A new style cpa attack on the ml implementation of RSA, 323
Akalp Kuzu, 2016, Correlation template matching cpa method. electroni-cletters, Electron Lett, 52, 1306, 10.1049/el.2016.0415
Wan, 2015, An optimized cross correlation power attack of message blinding exponentiation algorithms, China Commun, 12, 22, 10.1109/CC.2015.7122478
Xia, 2017, Epcbir: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing, Inf Sci, 397, 195, 10.1016/j.ins.2016.12.030
Xia, 2018, A novel weber local binary descriptor for fingerprint liveness detection, IEEE Trans Syst Man Cybern, 1
Xiao, 2018, Smk-means: an improved mini batch k-means algorithm based on mapreduce with big data, Comput Mater Continua, 56, 365
Batina, 2009, Differential cluster analysis, 5747, 112
Chen, 2013, Collision based on chosen message sample power clustering attack algorithm, China Commun, 10, 114, 10.1109/CC.2013.6520943
Heyszl, 2014, Clustering algorithms for non-profiled single-execution attacks on exponentiations, 8419, 79
Perin, 2014, Attacking randomized exponentiations using unsupervised learning, 8622, 144
Mahanta, 2018, Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomization, IET Inf Security, 12, 25, 10.1049/iet-ifs.2016.0508
Zhao, 2019, Design of feedback shift register of against power analysis attack, Comput Mater Continua, 58, 517, 10.32604/cmc.2019.03680