scientific article; zbMATH DE number 1979272

From MaRDI portal
Revision as of 03:11, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4425684

zbMath1019.68541MaRDI QIDQ4425684

No author found.

Publication date: 11 September 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2523/25230013.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (82)

Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMsLocalized Electromagnetic Analysis of Cryptographic ImplementationsA New Difference Method for Side-Channel Analysis with High-Dimensional Leakage ModelsTowards tight random probing securityOn the influence of optimizers in deep learning-based side-channel analysisOnline Template Attack on ECDSA:When Similarities Among Devices are Taken for Granted: Another Look at PortabilityDifferential power analysis of stream ciphers with LFSRsMultivariate Leakage Model for Improving Non-profiling DPA on Noisy Power TracesScore-Based vs. Probability-Based Enumeration – A Cautionary NoteAnalyzing the Shuffling Side-Channel Countermeasure for Lattice-Based SignaturesFirst full-fledged side channel attack on HMAC-SHA-2Security analysis of deterministic re-keying with masking and shuffling: application to ISAPFake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devicesAcoustic cryptanalysisA novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulatorsPartial Key Exposure Attack on CRT-RSASM4 Chaotic Masking Scheme Against Power Analysis Based on FPGACryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power AnalysisOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesBoosting Higher-Order Correlation Attacks by Dimensionality ReductionThe distributions of individual bits in the output of multiplicative operationsMasking and leakage-resilient primitives: one, the other(s) or both?Improved power analysis attacks on FalconFocus is key to success: a focal loss function for deep learning-based side-channel analysisOn the evaluation of deep learning-based side-channel analysisASCA vs. SASCA. A closer look at the AES key scheduleOn the feasibility of single-trace attacks on the Gaussian sampler using a CDTPunctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}On the exact relationship between the mutual information metric and the success rate metricDivided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacksA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingPhysical attacks and beyondDetecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacksBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsAttacking embedded ECC implementations through CMOV side channelsLattice attacks against elliptic-curve signatures with blinded scalar multiplicationA side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomialLearning with physical rounding for linear and quadratic leakage functionsRevisiting security estimation for LWE with hints from a geometric perspectiveA Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel AttacksRidge-Based Profiled Differential Power AnalysisTwo improved multiple-differential collision attacksMutual information analysis: a comprehensive studySliding-window correlation attacks against encryption devices with an unstable clockAssessing the feasibility of single trace power analysis of FrodoProfiled power analysis attacks using convolutional neural networks with domain knowledgeSCATTER: A New Dimension in Side-ChannelCryptanalysis of a Chaotic Block Cryptographic System Against Template AttacksThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksCategorising and comparing cluster-based DPA distinguishersRedefining the transparency orderOn the optimality and practicability of mutual information analysis in some scenariosStatistical properties of side-channel and fault injection attacks using coding theoryMasking the GLP lattice-based signature scheme at any orderWhite-box cryptography: don't forget about grey-box attacksMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionOn the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping SchemeImproving Differential Power Analysis by Elastic AlignmentA Unified Framework for the Analysis of Side-Channel Key Recovery AttacksA Leakage-Resilient Mode of OperationAffine Masking against Higher-Order Side Channel AnalysisFault template attacks on block ciphers exploiting fault propagationRandom Order m-ary ExponentiationClimbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel AttacksDifferential Bias Attack for Block Cipher Under Randomized Leakage with Key EnumerationCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeOn the Exact Success Rate of Side Channel Analysis in the Gaussian ModelTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsPKDPA: An Enhanced Probabilistic Differential Power Attack MethodologyFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksFuzzy matching template attacks on multivariate cryptography: a case studyAlgebraic Methods in Side-Channel Collision Attacks and Practical Collision DetectionMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleLWE with side information: attacks and concrete security estimationLearning-based side-channel analysis on PIPOA template attack to reconstruct the input of SHA-3 on an 8-bit deviceWavelet scattering transform and ensemble methods for side-channel analysis\textsf{Scatter}: a missing case?On the implementation efficiency of linear regression-based side-channel attacksKilroy was here: the first step towards explainability of neural networks in profiled side-channel analysisOnline performance evaluation of deep learning networks for profiled side-channel analysis




This page was built for publication: