NICV: normalized inter-class variance for detection of side-channel leakage, IACR Cryptology ePrint Archive, p.717, 2013. ,
Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop, pp.16-29, 2004. ,
Towards sound approaches to counteract power-analysis attacks, pp.398-412, 1999. ,
Enhancing electromagnetic attacks using spectral coherence based cartography, VLSI-SoC: Technologies for Systems Integration -17th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, pp.135-155, 2009. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00429342
The doubling attack -Why Upwards Is Better than Downwards, Cryptographic Hardware and Embedded Systems -CHES 2003, 5th International Workshop, pp.269-280, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00563965
Mutual information analysis, Cryptographic Hardware and Embedded Systems -CHES 2008, 10th International Workshop, pp.426-442, 2008. ,
Quantifying the quality of side channel acquisitions, COSADE, 2011. ,
Collision based attacks in practice, CRYPTO'PUCES, 2015. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01269809
Differential power analysis, Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conferences, pp.388-397, 1999. ,
Hardware countermeasures against dpa ? a statistical analysis of their effectiveness, CT-RSA, pp.222-235, 2004. ,
Power analysis attacks: Revealing the secrets of smart cards, vol.31, 2008. ,
A new correlation frequency analysis of the side channel, Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, p.4, 2010. ,
Enhancing correlation electromagnetic attack using planar near-field cartography, Design, Automation and Test in Europe, pp.628-633, 2009. ,
Blind cartography for side channel attacks: Cross-correlation cartography, Int. J. Reconfig. Comp, vol.360242, issue.9, pp.1-360242, 2012. ,
A new class of collision attacks and its application to DES, Fast Software Encryption, 10th International Workshop, FSE 2003, pp.206-222, 2003. ,
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009. ,
A model of the leakage in the frequency domain and its application to CPA and DPA, J. Cryptographic Engineering, vol.4, issue.3, pp.197-212, 2014. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01096000
Power analysis by exploiting chosen message and internal collisions -vulnerability of checking mechanism for rsadecryption, Progress in Cryptology -Mycrypt, pp.183-195, 2005. ,