Research on Correlation Power Analysis Attack against Piccolo

被引:0
|
作者
机构
[1] [1,Wang, Chenxu
[2] Zhao, Zhanfeng
[3] Yu, Mingyan
[4] Wang, Jinxiang
[5] Jiang, Peihe
来源
Wang, C. (wangchenxu@hit.edu.cn) | 1600年 / Harbin Institute of Technology卷 / 45期
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A Correlation Power Analysis Attack against Tate Pairing on FPGA
    Pan, Weibo
    Marnane, William P.
    RECONFIGURABLE COMPUTING: ARCHITECTURES, TOOLS AND APPLICATIONS, 2011, 6578 : 340 - 349
  • [2] Enhanced correlation power analysis attack against trusted systems
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 3 - 10
  • [3] Correlation Power Analysis Attack against Synchronous Stream Ciphers
    Wu, Keke
    Li, Huiyun
    Peng, Bo
    Yu, Fengqi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2067 - +
  • [4] Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack
    Li, Yanbin
    Liu, Zhe
    Guilley, Sylvain
    Tang, Ming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4466 - 4481
  • [5] Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
    Chakraborty, Abhishek
    Mondal, Ankit
    Srivastava, Ankur
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 171 - 171
  • [6] Bus-Invert Coding as a Low-Power Countermeasure Against Correlation Power Analysis Attack
    Vosoughi, M. Ali
    Wang, Longfei
    Kose, Selcuk
    2019 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION (SLIP), 2019,
  • [7] Research on the Secure RISC-V Processor Against a Power Analysis Attack
    Liu Q.
    Liu B.
    Lu S.
    Sai B.
    Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, 2021, 54 (08): : 868 - 874
  • [8] Correlation Power Analysis on KASUMI: Attack and Countermeasure
    Gupta, Devansh
    Tripathy, Somanath
    Mazumdar, Bodhisatwa
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 142 - 156
  • [9] Zero Correlation Linear Attack on Reduced Round Piccolo-80
    Ahangarkolaei, Mohammad Zare
    Najarkolaei, Seyed Reza Hoseini
    Ahmadi, Siavash
    Aref, Mohammad Reza
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 66 - 71
  • [10] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,