scientific article; zbMATH DE number 1979272
From MaRDI portal
Publication:4425684
zbMath1019.68541MaRDI QIDQ4425684
No author found.
Publication date: 11 September 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2523/25230013.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (82)
Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs ⋮ Localized Electromagnetic Analysis of Cryptographic Implementations ⋮ A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models ⋮ Towards tight random probing security ⋮ On the influence of optimizers in deep learning-based side-channel analysis ⋮ Online Template Attack on ECDSA: ⋮ When Similarities Among Devices are Taken for Granted: Another Look at Portability ⋮ Differential power analysis of stream ciphers with LFSRs ⋮ Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces ⋮ Score-Based vs. Probability-Based Enumeration – A Cautionary Note ⋮ Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures ⋮ First full-fledged side channel attack on HMAC-SHA-2 ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices ⋮ Acoustic cryptanalysis ⋮ A novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulators ⋮ Partial Key Exposure Attack on CRT-RSA ⋮ SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA ⋮ Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Boosting Higher-Order Correlation Attacks by Dimensionality Reduction ⋮ The distributions of individual bits in the output of multiplicative operations ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Improved power analysis attacks on Falcon ⋮ Focus is key to success: a focal loss function for deep learning-based side-channel analysis ⋮ On the evaluation of deep learning-based side-channel analysis ⋮ ASCA vs. SASCA. A closer look at the AES key schedule ⋮ On the feasibility of single-trace attacks on the Gaussian sampler using a CDT ⋮ Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece} ⋮ On the exact relationship between the mutual information metric and the success rate metric ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks ⋮ A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding ⋮ Physical attacks and beyond ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Lattice attacks against elliptic-curve signatures with blinded scalar multiplication ⋮ A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Revisiting security estimation for LWE with hints from a geometric perspective ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Ridge-Based Profiled Differential Power Analysis ⋮ Two improved multiple-differential collision attacks ⋮ Mutual information analysis: a comprehensive study ⋮ Sliding-window correlation attacks against encryption devices with an unstable clock ⋮ Assessing the feasibility of single trace power analysis of Frodo ⋮ Profiled power analysis attacks using convolutional neural networks with domain knowledge ⋮ SCATTER: A New Dimension in Side-Channel ⋮ Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Categorising and comparing cluster-based DPA distinguishers ⋮ Redefining the transparency order ⋮ On the optimality and practicability of mutual information analysis in some scenarios ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Masking the GLP lattice-based signature scheme at any order ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme ⋮ Improving Differential Power Analysis by Elastic Alignment ⋮ A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks ⋮ A Leakage-Resilient Mode of Operation ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Fault template attacks on block ciphers exploiting fault propagation ⋮ Random Order m-ary Exponentiation ⋮ Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks ⋮ Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ On the Exact Success Rate of Side Channel Analysis in the Gaussian Model ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ Fuzzy matching template attacks on multivariate cryptography: a case study ⋮ Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ LWE with side information: attacks and concrete security estimation ⋮ Learning-based side-channel analysis on PIPO ⋮ A template attack to reconstruct the input of SHA-3 on an 8-bit device ⋮ Wavelet scattering transform and ensemble methods for side-channel analysis ⋮ \textsf{Scatter}: a missing case? ⋮ On the implementation efficiency of linear regression-based side-channel attacks ⋮ Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis ⋮ Online performance evaluation of deep learning networks for profiled side-channel analysis
This page was built for publication: