Pages that link to "Item:Q3627450"
From MaRDI portal
The following pages link to A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450):
Displaying 22 items.
- Affine Masking against Higher-Order Side Channel Analysis (Q3084260) (← links)
- PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology (Q3104719) (← links)
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks (Q3104720) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- On the Use of Independent Component Analysis to Denoise Side-Channel Measurements (Q3297552) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces (Q3454163) (← links)
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks (Q3455513) (← links)
- Impossibility of Black-Box Simulation Against Leakage Attacks (Q3457063) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks (Q4639480) (← links)
- Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications (Q4975180) (← links)
- Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis (Q5094763) (← links)
- Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам (Q5152388) (← links)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889) (← links)
- Asymptotic information leakage under one-try attacks (Q5740624) (← links)
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers (Q6061536) (← links)
- Focus is key to success: a focal loss function for deep learning-based side-channel analysis (Q6064589) (← links)
- On the evaluation of deep learning-based side-channel analysis (Q6064590) (← links)
- Systematic study of decryption and re-encryption leakage: the case of Kyber (Q6086403) (← links)
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model (Q6145951) (← links)
- Learning with physical rounding for linear and quadratic leakage functions (Q6186764) (← links)