Practical algebraic side-channel attacks against ACORN
From MaRDI portal
Recommendations
Cited in
(5)- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
- Cryptanalysis of Acorn in nonce-reuse setting
- ASCA vs. SASCA. A closer look at the AES key schedule
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- Certain Observations on ACORN v3 and the Implications to TMDTO Attacks
This page was built for publication: Practical algebraic side-channel attacks against ACORN
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1736065)