Pages that link to "Item:Q3627450"
From MaRDI portal
The following pages link to A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450):
Displayed 50 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- AES side-channel countermeasure using random tower field constructions (Q369425) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- On the optimality and practicability of mutual information analysis in some scenarios (Q680928) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- On the influence of optimizers in deep learning-based side-channel analysis (Q832396) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data (Q1648801) (← links)
- Physical attacks and beyond (Q1698608) (← links)
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks (Q1698614) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Sliding-window correlation attacks against encryption devices with an unstable clock (Q1726674) (← links)
- Assessing the feasibility of single trace power analysis of Frodo (Q1726676) (← links)
- Profiled power analysis attacks using convolutional neural networks with domain knowledge (Q1726696) (← links)
- Categorising and comparing cluster-based DPA distinguishers (Q1746989) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers (Q2043316) (← links)
- A template attack to reconstruct the input of SHA-3 on an 8-bit device (Q2106680) (← links)
- \textsf{Scatter}: a missing case? (Q2106687) (← links)
- On the implementation efficiency of linear regression-based side-channel attacks (Q2106690) (← links)
- Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis (Q2106693) (← links)
- Online performance evaluation of deep learning networks for profiled side-channel analysis (Q2106696) (← links)
- Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) (Q2120987) (← links)
- How to fool a black box machine learning based side-channel security evaluation (Q2120993) (← links)
- Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis (Q2145285) (← links)
- Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage (Q2145294) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- Reinforcement learning-based design of side-channel countermeasures (Q2154063) (← links)
- A novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulators (Q2170091) (← links)
- On the exact relationship between the mutual information metric and the success rate metric (Q2195409) (← links)
- Trojan-resilience without cryptography (Q2697869) (← links)
- A Note on the Use of Margins to Compare Distinguishers (Q2794561) (← links)
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers (Q2794562) (← links)
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research (Q2794592) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Near Collision Side Channel Attacks (Q2807214) (← links)
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks (Q2807219) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models (Q2890018) (← links)
- Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis (Q2890021) (← links)
- Complementing Feistel Ciphers (Q2946868) (← links)
- Higher-Order Side Channel Security and Mask Refreshing (Q2946888) (← links)
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations (Q2958136) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks (Q2975813) (← links)
- Improving DPA by Peak Distribution Analysis (Q3084258) (← links)