aewag / physical-attack-collection

0 stars 0 forks source link

Kulikowski_2006 #686

Open aewag opened 1 week ago

aewag commented 1 week ago

WDYT? Is this publication in scope?

@inbook{Kulikowski_2006,
 author = {Kulikowski, Konrad J. and Karpovsky, Mark G. and Taubin, Alexander},
 booktitle = {Fault Diagnosis and Tolerance in Cryptography},
 doi = {10.1007/11889700_19},
 isbn = {9783540462514},
 issn = {1611-3349},
 pages = {211–222},
 publisher = {Springer Berlin Heidelberg},
 title = {DPA on Faulty Cryptographic Hardware and Countermeasures},
 url = {http://dx.doi.org/10.1007/11889700_19},
 year = {2006}
}

URL: http://dx.doi.org/10.1007/11889700_19 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1007/11889700_19

aewag commented 1 week ago

Yes

aewag commented 1 week ago

I didnot find DOIs for the following references:

[
    {
        "key": "19_CR1",
        "unstructured": "Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: 28th European Solid-State Circuits Conference (ESSCIRC 2002), pp. 403\u2013406 (September 2002)"
    },
    {
        "key": "19_CR3",
        "unstructured": "MacDonald, D.J.: A Balanced-Power Domino-Style Standard Cell Library for Fine-Grain Asynchronous Pipelined Design to Resist Differential Power Analysis Attacks. Master of Science Thesis, Boston University, Boston (2005), Availabe at: http://reliable.bu.edu/Pro-jects/MacDonald_thesis.pdf"
    },
    {
        "key": "19_CR4",
        "unstructured": "Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resis-tant ASIC or FPGA Implementation. In: Design, Automation and Test in Europe Conference (DATE 2004), pp. 246\u2013251 (February 2004)"
    },
    {
        "key": "19_CR5",
        "unstructured": "Jaffe, J., Kocher, P., Jun, B.: Hardware-level mitigation and DPA countermeasures for cryptographic devices. US Patent 6654884"
    },
    {
        "key": "19_CR12",
        "unstructured": "Gregorio, A.D.: Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. In: FTDC 2005 (2005)"
    },
    {
        "key": "19_CR13",
        "unstructured": "Canovas, C., Clediere, J.: What do S-boxes Say in Differential Side Channel Attacks? IACR e-Print archive 2005/311 (2005)"
    },
    {
        "key": "19_CR14",
        "unstructured": "FIPS PUB 197: Advanced Encryption Standard, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf"
    }
]