Side-channel cryptographic attacks using pseudo-Boolean optimization
From MaRDI portal
Publication:2398519
DOI10.1007/S10601-015-9237-3zbMATH Open1368.94121DBLPjournals/constraints/OrenW16OpenAlexW2195466524WikidataQ59051260 ScholiaQ59051260MaRDI QIDQ2398519FDOQ2398519
Authors: Yossef Oren, Avishai Wool
Publication date: 16 August 2017
Published in: Constraints (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10601-015-9237-3
Recommendations
- A new framework for constraint-based probabilistic template side channel attacks
- A multi-round side channel attack on AES using belief propagation
- Computing AES related-key differential characteristics with constraint programming
- Algebraic side-channel analysis in the presence of errors
- Revisiting AES related-key differential attacks with constraint programming
Cites Work
- Title not available (Why is that?)
- Conflict analysis in mixed integer programming
- Title not available (Why is that?)
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Algebraic Cryptanalysis of the Data Encryption Standard
- A Very Compact S-Box for AES
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Power Analysis Attacks
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Title not available (Why is that?)
- Algebraic side-channel attacks
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Title not available (Why is that?)
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- Frontiers of Combining Systems
- Algebraic side-channel analysis in the presence of errors
Cited In (8)
- Computing AES related-key differential characteristics with constraint programming
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- A new framework for constraint-based probabilistic template side channel attacks
- Side Channel Attacks on Irregularly Decimated Generators
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- Public Key Cryptography - PKC 2005
Uses Software
This page was built for publication: Side-channel cryptographic attacks using pseudo-Boolean optimization
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2398519)