Key Bit-Dependent Attack on Protected PKC Using a Single Trace (Q5056016): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: mbed TLS / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: OpenSSL / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-72359-4_10 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2775625212 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5483032 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information and Communications Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal Correlation Analysis on Exponentiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707395 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace / rank
 
Normal rank
Property / cites work
 
Property / cites work: Localized Electromagnetic Analysis of Cryptographic Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Comparative Power Analysis of Modular Exponentiation Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical Countermeasure against Address-Bit Differential Power Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425714 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Highly Regular Right-to-Left Algorithms for Scalar Multiplication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502798 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797783 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Speeding the Pollard and Elliptic Curve Methods of Factorization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking embedded ECC implementations through CMOV side channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking Randomized Exponentiations Using Unsupervised Learning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797390 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 02:04, 31 July 2024

scientific article; zbMATH DE number 7631479
Language Label Description Also known as
English
Key Bit-Dependent Attack on Protected PKC Using a Single Trace
scientific article; zbMATH DE number 7631479

    Statements

    Key Bit-Dependent Attack on Protected PKC Using a Single Trace (English)
    0 references
    0 references
    0 references
    9 December 2022
    0 references
    side-channel analysis
    0 references
    public key cryptosystems
    0 references
    single trace attack
    0 references
    simple power analysis
    0 references
    clustering
    0 references
    0 references
    0 references

    Identifiers