Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-69453-5_4 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2575587164 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mutual information analysis: a comprehensive study / rank
 
Normal rank
Property / cites work
 
Property / cites work: A More Efficient AES Threshold Implementation / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conversion of Security Proofs from One Leakage Model to Another: A New Issue / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Method for Random Delay Generation in Embedded Software / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Second-Order Side Channel Attack Based on Linear Regression / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making Masking Security Proofs Concrete / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Certify the Leakage of a Chip? / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Gaussian Mixture Models for Higher-Order Side Channel Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical Tools Flavor Side-Channel Collision Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pushing the Limits: A Very Compact and a Threshold Implementation of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side-channel resistant crypto for less than 2,300 GE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical Analysis of Second Order Differential Power Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Consolidating Masking Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Higher-Order Masking of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage assessment methodology. A clear roadmap for side-channel evaluations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Myth of Generic DPA…and the Magic of Learning / rank
 
Normal rank

Latest revision as of 03:37, 15 July 2024

scientific article
Language Label Description Also known as
English
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
scientific article

    Statements

    Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (English)
    0 references
    0 references
    0 references
    0 references
    16 February 2018
    0 references
    0 references
    0 references

    Identifiers