On the exact relationship between the mutual information metric and the success rate metric
From MaRDI portal
Publication:2195409
Recommendations
- Theoretical and practical aspects of mutual information-based side channel analysis
- Mutual Information Analysis: How, When and Why?
- On the optimality and practicability of mutual information analysis in some scenarios
- Mutual information analysis: a comprehensive study
- A key to success. Success exponents for side-channel distinguishers
Cites work
- scientific article; zbMATH DE number 1583801 (Why is no real title available?)
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1979273 (Why is no real title available?)
- scientific article; zbMATH DE number 1759298 (Why is no real title available?)
- scientific article; zbMATH DE number 1759354 (Why is no real title available?)
- scientific article; zbMATH DE number 1878336 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks
- A statistical model for DPA with novel algorithmic confusion analysis
- A statistical model for higher order DPA on masked devices
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- From improved leakage detection to the detection of points of interests in leakage traces
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- How to certify the leakage of a chip?
- Improving DPA by peak distribution analysis
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Mutual Information Analysis: How, When and Why?
- Mutual information analysis: a comprehensive study
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Power Analysis Attacks
- Template attacks on different devices
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(1)
This page was built for publication: On the exact relationship between the mutual information metric and the success rate metric
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2195409)