Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses
From MaRDI portal
Publication:2672307
DOI10.1007/S10623-022-01042-2zbMATH Open1489.94105OpenAlexW4280534361WikidataQ114849752 ScholiaQ114849752MaRDI QIDQ2672307FDOQ2672307
Authors: Luka Music, Céline Chevalier, Elham Kashefi
Publication date: 8 June 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-022-01042-2
Recommendations
- Dispelling myths on superposition attacks: formal security model and attack analyses
- Dispelling myths on superposition attacks: formal security model and attack analyses
- Superposition attacks on cryptographic protocols
- Correction to: ``Unconditionally secure computation against low-complexity leakage
- Correction to: ``Unconditionally secure computation against low-complexity leakage
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
Cited In (1)
This page was built for publication: Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2672307)