Counting Keys in Parallel After a Side Channel Attack
From MaRDI portal
Publication:2795977
DOI10.1007/978-3-662-48800-3_13zbMath1375.94148OpenAlexW2295469613MaRDI QIDQ2795977
Elisabeth Oswald, Martijn Stam, Jonathan F. O'Connell, Daniel P. Martin
Publication date: 23 March 2016
Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://eprint.iacr.org/2015/689
Related Items (7)
Score-Based vs. Probability-Based Enumeration – A Cautionary Note ⋮ Practical Leverage-Based Sampling for Low-Rank Tensor Decomposition ⋮ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Quantum key search with side channel advice ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration
This page was built for publication: Counting Keys in Parallel After a Side Channel Attack