Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Analysis of two countermeasures against the signal leakage attack

From MaRDI portal
Publication:2177644
Jump to:navigation, search

DOI10.1007/978-3-030-23696-0_19zbMATH Open1454.94104OpenAlexW2956000009MaRDI QIDQ2177644FDOQ2177644


Authors: Yanyan Li Edit this on Wikidata


Publication date: 6 May 2020


Full work available at URL: https://doi.org/10.1007/978-3-030-23696-0_19




Recommendations

  • Towards sound approaches to counteract power-analysis attacks
  • Cryptanalysis of two fault countermeasure schemes
  • Exploiting the leakage: analysis of some authenticated encryption schemes
  • Signal-flow-based analysis of wireless security protocols


zbMATH Keywords

active attackskey exchangepost-quantumcountermeasuresRLWEkey reusekey mismatch


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (5)

  • Key reuse attack on NewHope key exchange protocol
  • Complete attack on RLWE key exchange with reused keys, without signal leakage
  • On optimizing electricity markets performance
  • Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor
  • Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants





This page was built for publication: Analysis of two countermeasures against the signal leakage attack

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2177644)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2177644&oldid=14698037"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 2 February 2024, at 01:00. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki