A template attack to reconstruct the input of SHA-3 on an 8-bit device
From MaRDI portal
Publication:2106680
Recommendations
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- An optimal key enumeration algorithm and its application to side-channel attacks
- Differential power analysis of MAC-Keccak at any key-length
- Keccak
- Scikit-learn: machine learning in Python
- Topics in Cryptology – CT-RSA 2004
Cited in
(3)
This page was built for publication: A template attack to reconstruct the input of SHA-3 on an 8-bit device
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106680)