Research on Correlation Power Analysis Attack against Piccolo

被引:0
|
作者
机构
[1] [1,Wang, Chenxu
[2] Zhao, Zhanfeng
[3] Yu, Mingyan
[4] Wang, Jinxiang
[5] Jiang, Peihe
来源
Wang, C. (wangchenxu@hit.edu.cn) | 1600年 / Harbin Institute of Technology卷 / 45期
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator
    Yoshida, Kota
    Okura, Shunsuke
    Shiozaki, Mitsuru
    Kubota, Takaya
    Fujino, Takeshi
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [42] Model Reverse-Engineering Attack against Systolic-Array-Based DNN Accelerator Using Correlation Power Analysis
    Yoshida, Kota
    Shiozaki, Mitsuru
    Okura, Shunsuke
    Kubota, Takaya
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 152 - 161
  • [43] Power analysis security evaluation on Piccolo based on FPGA platform
    Wang, Chen-Xu
    Li, Jing-Hu
    Yu, Ming-Yan
    Wang, Jin-Xiang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (01): : 101 - 107
  • [44] Correlation Power Analysis Attack on the PingPong-128 Key Stream Generator
    Kang, Young-Jin
    Kim, Hyun Ho
    Bruce, Ndibanje
    Park, YoungGoo
    Lee, HoonJae
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 506 - 509
  • [45] A Novel Correlation Power Analysis Attack on Balanced CRT-based RSA
    Wang, Min
    Huang, Kama
    Wu, Zhen
    Du, Zhibo
    Wang, Yi
    Lin, Bing
    Xi, Wei
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 280 - 280
  • [46] Related-key Impossible Differential Attack on Piccolo
    Xu L.-H.
    Guo J.-S.
    Cui J.-Y.
    Li M.-M.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2349 - 2361
  • [47] A Cluster Correlation power analysis against double blinding exponentiation
    Wan, Wunan
    Chen, Jun
    Zhang, Shibing
    Xia, Jinyue
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [48] Power Analysis Attack Against post-SAT Logic Locking schemes
    Riadi, Nassim
    Bruguier, Florent
    Benoit, Pascal
    Dupuis, Sophie
    Flottes, Marie-Lise
    IEEE EUROPEAN TEST SYMPOSIUM, ETS 2024, 2024,
  • [49] A simple power analysis attack against the key schedule of the Camellia block cipher
    Xiao, L
    Heys, HM
    INFORMATION PROCESSING LETTERS, 2005, 95 (03) : 409 - 412
  • [50] A Wavelet-based Power Analysis Attack against Random Delay Countermeasure
    Dong, Xiaofei
    Zhang, Fan
    Queshi, Samiya
    Zhang, Yiran
    Liang, Ziyuan
    Yang, Bolin
    Gao, Feng
    PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, : 19 - 24