Counting Keys in Parallel After a Side Channel Attack
From MaRDI portal
Recommendations
- Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
- An optimal key enumeration algorithm and its application to side-channel attacks
- Theoretical security evaluation against side-channel cube attack with key enumeration
- Parallel decryption queries in bounded chosen ciphertext attacks
- Fast and memory-efficient key recovery in side-channel attacks
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- Side-Channel Attack against RSA Key Generation Algorithms
Cited in
(18)- How to sequentialize independent parallel attacks? Biased distributions have a phase transition
- Simpler and more efficient rank estimation for side-channel security assessment
- An optimal key enumeration algorithm and its application to side-channel attacks
- On recovering block cipher secret keys in the cold boot attack setting
- Quantum key search with side channel advice
- Fast and memory-efficient key recovery in side-channel attacks
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note
- Characterisation and estimation of the key rank distribution in the context of side channel evaluations
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Practical leverage-based sampling for low-rank tensor decomposition
- Back to Massey: impressively fast, scalable and tight security evaluation tools
- Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
- Fast analytical rank estimation
- Poly-logarithmic side channel rank estimation via exponential sampling
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
- Simple key enumeration (and rank estimation) using histograms: an integrated approach
- Differential bias attack for block cipher under randomized leakage with key enumeration
This page was built for publication: Counting Keys in Parallel After a Side Channel Attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2795977)