When should an implementation attack be viewed as successful? (Q2867256)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: When should an implementation attack be viewed as successful? |
scientific article; zbMATH DE number 6237282
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | When should an implementation attack be viewed as successful? |
scientific article; zbMATH DE number 6237282 |
Statements
When Should an Implementation Attack Be Viewed as Successful? (English)
0 references
10 December 2013
0 references
side-channel analysis
0 references
fault analysis
0 references
algebraic side-channel analysis
0 references
exponent blinding
0 references
lattice-based cryptography
0 references
0.7657789587974548
0 references
0.748950719833374
0 references
0.7427353858947754
0 references
0.7359435558319092
0 references
0.7345120310783386
0 references