Side-channel cryptographic attacks using pseudo-Boolean optimization
From MaRDI portal
(Redirected from Publication:2398519)
Recommendations
- A new framework for constraint-based probabilistic template side channel attacks
- A multi-round side channel attack on AES using belief propagation
- Computing AES related-key differential characteristics with constraint programming
- Algebraic side-channel analysis in the presence of errors
- Revisiting AES related-key differential attacks with constraint programming
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 5139165 (Why is no real title available?)
- scientific article; zbMATH DE number 1950623 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Very Compact S-Box for AES
- Algebraic Cryptanalysis of the Data Encryption Standard
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Algebraic side-channel analysis in the presence of errors
- Algebraic side-channel attacks
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Conflict analysis in mixed integer programming
- Frontiers of Combining Systems
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- PRESENT: An Ultra-Lightweight Block Cipher
- Power Analysis Attacks
Cited in
(8)- Computing AES related-key differential characteristics with constraint programming
- Side Channel Attacks on Irregularly Decimated Generators
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- A new framework for constraint-based probabilistic template side channel attacks
- Public Key Cryptography - PKC 2005
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
This page was built for publication: Side-channel cryptographic attacks using pseudo-Boolean optimization
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2398519)