Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
From MaRDI portal
Publication:2807219
DOI10.1007/978-3-319-31301-6_19zbMath1396.94062OpenAlexW2899670054MaRDI QIDQ2807219
Kamran Manzoor, Andrey Bogdanov, Elmar Tischhauser, Ilya Kizhvatov, Marc F. Witteman
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_19
Related Items (6)
Score-Based vs. Probability-Based Enumeration – A Cautionary Note ⋮ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Quantum key search with side channel advice ⋮ Fast and Memory-Efficient Key Recovery in Side-Channel Attacks ⋮ Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration
Uses Software
Cites Work
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
- Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
- Soft Analytical Side-Channel Attacks
- ALE: AES-Based Lightweight Authenticated Encryption
- Improving DPA by Peak Distribution Analysis
- Intel’s New AES Instructions for Enhanced Performance and Security
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Analysis of Pseudo Random Sequences Generated by Cellular Automata
This page was built for publication: Fast and Memory-Efficient Key Recovery in Side-Channel Attacks