Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Side-channel attack
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Further reading== ===Books=== * {{cite book|author=Ambrose, Jude|title=Power Analysis Side Channel Attacks: The Processor Design-level Context|publisher=VDM Verlag|year=2010|isbn=978-3-8364-8508-1|url=https://books.google.com/books?id=n9wsQwAACAAJ|display-authors=etal}} ===Articles=== * [http://www.rambus.com/differential-power-analysis/], Differential Power Analysis, P. Kocher, J. Jaffe, B. Jun, appeared in CRYPTO'99. * [https://www.researchgate.net/publication/269463480_Side_channel_attack_An_approach_based_on_machine_learning], Side channel attack: an approach based on machine learning, 2011, L Lerman, G Bontempi, O Markowitch. * [http://www.rambus.com/timing-attacks-on-implementations-of-diffie-hellman-rsa-dss-and-other-systems/], Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, P. Kocher. * [http://www.rambus.com/introduction-to-differential-power-analysis-and-related-attacks/], Introduction to Differential Power Analysis and Related attacks, 1998, P Kocher, J Jaffe, B Jun. * [https://web.archive.org/web/20000816072517/http://csrc.nist.gov/encryption/aes/round1/conf2/papers/chari.pdf Nist.gov], a cautionary Note Regarding Evaluation of AES Candidates on Smart Cards, 1999, S Chari, C Jutla, J R Rao, P Rohatgi * DES and Differential Power Analysis, L Goubin and J Patarin, in Proceedings of CHES'99, Lecture Notes in Computer Science Nr 1717, Springer-Verlag * {{cite book|author=Grabher, Philipp|chapter=Cryptographic Side-Channels from Low-power Cache Memory|editor=Galbraith, Steven D.|title=Cryptography and coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007: proceedings, Volume 11|publisher=Springer|year=2007|isbn=978-3-540-77271-2|chapter-url=https://books.google.com/books?id=V0L2Ki72osoC&pg=PA170|display-authors=etal}} *{{cite journal |first1=Abdel Alim |last1=Kamal |first2=Amr M. |last2=Youssef |title=Fault analysis of the NTRUSign digital signature scheme |journal=Cryptography and Communications |volume=4 |issue=2 |pages=131β144 |year=2012 |doi=10.1007/s12095-011-0061-3 |s2cid=2901175 }} * {{cite web |url=http://www.tau.ac.il/~tromer/acoustic/ |title=RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis |author1=Daniel Genkin |author2=Adi Shamir |author3=Eran Tromer |date=December 18, 2013 |website=[[Tel Aviv University]] |access-date=October 15, 2014}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)