Pages that link to "Item:Q3455513"
From MaRDI portal
The following pages link to An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks (Q3455513):
Displayed 10 items.
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029) (← links)
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research (Q2794592) (← links)
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks (Q2807219) (← links)
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations (Q2958136) (← links)
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF (Q2958140) (← links)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks (Q2975813) (← links)
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note (Q3179482) (← links)
- Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration (Q4975181) (← links)