ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
From MaRDI portal
Publication:2795975
DOI10.1007/978-3-662-48800-3_12zbMath1375.94130OpenAlexW2398251914MaRDI QIDQ2795975
Vincent Grosso, François-Xavier Standaert
Publication date: 23 March 2016
Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48800-3_12
Related Items (4)
On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data ⋮ ASCA vs. SASCA. A closer look at the AES key schedule ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?