Linked e-resources
Details
Table of Contents
Security and Physical Attacks
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Co-location detection on the Cloud
Simple Photonic Emission Attack with Reduced Data Complexity
Side-Channel Analysis (case studies)
Power Analysis Attacks against IEEE 802.15.4 Node
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Fault Analysis
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Improved Differential Fault Analysis on Camellia-128
A Note on the Security of CHES 2014 Symmetric Infective Countermeasure
Side-Channel Analysis (tools)
Simpler, Faster, and More Robust T-test Based Leakage Detection
Design and implementation of a waveform-matching based triggering system
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Co-location detection on the Cloud
Simple Photonic Emission Attack with Reduced Data Complexity
Side-Channel Analysis (case studies)
Power Analysis Attacks against IEEE 802.15.4 Node
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Fault Analysis
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Improved Differential Fault Analysis on Camellia-128
A Note on the Security of CHES 2014 Symmetric Infective Countermeasure
Side-Channel Analysis (tools)
Simpler, Faster, and More Robust T-test Based Leakage Detection
Design and implementation of a waveform-matching based triggering system
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.