Locked History Actions

Diff for "SPACES Publications"

Differences between revisions 16 and 19 (spanning 3 versions)
Revision 16 as of 2012-02-10 17:41:12
Size: 805
Editor: celinux222
Comment:
Revision 19 as of 2012-02-10 17:48:07
Size: 1359
Editor: celinux222
Comment:
Deletions are marked like this. Additions are marked like this.
Line 8: Line 8:
= EMA = = Physical understanding =
Line 11: Line 11:
 * [[attachment:EMC11_rsademod.pdf|2. O. Meynard, Y. Hayashi, N. Homma, S. Guilley, J-L Danger, “Identification of information leakage spots on a cryptographic device with an RSA processor,” EMC2011, pp. 773-778, Long Beach, August 2011|&do=get]]  * [[attachment:EMC11_rsademod.pdf|O. Meynard, Y. Hayashi, N. Homma, S. Guilley, J-L Danger, “Identification of information leakage spots on a cryptographic device with an RSA processor,” EMC2011, pp. 773-778, Long Beach, August 2011|&do=get]]
Line 13: Line 13:
= Attack Understanding =  * [[attachment:DATE_11_enhancement.pdf|O. Meynard, D. Real, S. Guilley, J-L. Danger, and N. Homma, “Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques,” DATE2011, pp. 1004-1009, March, 2011.|&do=get]]


= Analysis technique =

 * [[attachment:WIFS_11_resynchro.pdf|N. Debande, Y. Souissi, S. Guilley, J-L. Danger, M. Nassar, Thanh-Ha Le, “Re-synchronization by Moments*: an efficient solution to align Side-Channel traces,” WIFS2011, Foz de Iguacu, Brazil, Dec., 2011. |&do=get]]