On the implementation efficiency of linear regression-based side-channel attacks
From MaRDI portal
Publication:2106690
Recommendations
- Linear regression analysis for leakage model of differential side channel cryptanalysis
- Linear regression attack with F-test: a new SCARE technique for secret block ciphers
- Profiling DPA: efficacy and efficiency trade-offs
- Soft analytical side-channel attacks
- Montgomery’s Trick and Fast Implementation of Masked AES
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1455096 (Why is no real title available?)
- scientific article; zbMATH DE number 1504655 (Why is no real title available?)
- scientific article; zbMATH DE number 3013180 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A New Second-Order Side Channel Attack Based on Linear Regression
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking
- Behind the scene of side channel attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic hardware and embedded systems -- CHES 2014. 16th international workshop, Busan, South Korea, September 23--26, 2014. Proceedings
- Good is not good enough. Deriving optimal distinguishers from communication theory
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- Masks will fall off. Higher-order optimal distinguishers
- Multiplying matrices faster than coppersmith-winograd
- On Second-Order Differential Power Analysis
- On the relationship between correlation power analysis and the stochastic approach: an ASIC designer perspective
- Public Key Cryptography - PKC 2005
- Spectral approach for correlation power analysis
- Statistical Analysis of Second Order Differential Power Analysis
- Template Attacks on Masking—Resistance Is Futile
- Topics in Cryptology – CT-RSA 2006
Cited in
(2)
This page was built for publication: On the implementation efficiency of linear regression-based side-channel attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106690)