A template attack to reconstruct the input of SHA-3 on an 8-bit device
From MaRDI portal
Publication:2106680
DOI10.1007/978-3-030-68773-1_2zbMATH Open1504.94198OpenAlexW3127702491MaRDI QIDQ2106680FDOQ2106680
Authors: Shih-Chun You, Markus G. Kuhn
Publication date: 16 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68773-1_2
Recommendations
Cites Work
- Keccak
- Scikit-learn: machine learning in Python
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2004
- An optimal key enumeration algorithm and its application to side-channel attacks
- Differential power analysis of MAC-Keccak at any key-length
Cited In (3)
Uses Software
This page was built for publication: A template attack to reconstruct the input of SHA-3 on an 8-bit device
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106680)