Side-channel cryptographic attacks using pseudo-Boolean optimization
From MaRDI portal
Publication:2398519
DOI10.1007/s10601-015-9237-3zbMath1368.94121DBLPjournals/constraints/OrenW16OpenAlexW2195466524WikidataQ59051260 ScholiaQ59051260MaRDI QIDQ2398519
Publication date: 16 August 2017
Published in: Constraints (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10601-015-9237-3
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Conflict analysis in mixed integer programming
- Algebraic Side-Channel Attacks
- A Very Compact S-Box for AES
- PRESENT: An Ultra-Lightweight Block Cipher
- Algebraic Side-Channel Analysis in the Presence of Errors
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- Power Analysis Attacks
- Algebraic Cryptanalysis of the Data Encryption Standard
- Frontiers of Combining Systems
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
This page was built for publication: Side-channel cryptographic attacks using pseudo-Boolean optimization