Differences between revisions 16 and 19 (spanning 3 versions)
Size: 805
Comment:
|
Size: 1359
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 8: | Line 8: |
= EMA = | = Physical understanding = |
Line 11: | Line 11: |
* [[attachment:EMC11_rsademod.pdf|2. O. Meynard, Y. Hayashi, N. Homma, S. Guilley, J-L Danger, “Identification of information leakage spots on a cryptographic device with an RSA processor,” EMC2011, pp. 773-778, Long Beach, August 2011|&do=get]] | * [[attachment:EMC11_rsademod.pdf|O. Meynard, Y. Hayashi, N. Homma, S. Guilley, J-L Danger, “Identification of information leakage spots on a cryptographic device with an RSA processor,” EMC2011, pp. 773-778, Long Beach, August 2011|&do=get]] |
Line 13: | Line 13: |
= Attack Understanding = | * [[attachment:DATE_11_enhancement.pdf|O. Meynard, D. Real, S. Guilley, J-L. Danger, and N. Homma, “Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques,” DATE2011, pp. 1004-1009, March, 2011.|&do=get]] = Analysis technique = * [[attachment:WIFS_11_resynchro.pdf|N. Debande, Y. Souissi, S. Guilley, J-L. Danger, M. Nassar, Thanh-Ha Le, “Re-synchronization by Moments*: an efficient solution to align Side-Channel traces,” WIFS2011, Foz de Iguacu, Brazil, Dec., 2011. |&do=get]] |
CHES'11 Posters
Modeling, simulation
Physical understanding