Fast and memory-efficient key recovery in side-channel attacks
From MaRDI portal
Publication:2807219
Recommendations
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- An optimal key enumeration algorithm and its application to side-channel attacks
- Counting Keys in Parallel After a Side Channel Attack
- Soft analytical side-channel attacks
- Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
Cites work
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- ALE: AES-based lightweight authenticated encryption
- An optimal key enumeration algorithm and its application to side-channel attacks
- Analysis of Pseudo Random Sequences Generated by Cellular Automata
- Fast and memory-efficient key recovery in side-channel attacks
- Improving DPA by peak distribution analysis
- Intel’s New AES Instructions for Enhanced Performance and Security
- Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer
- Soft analytical side-channel attacks
Cited in
(20)- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Recovering short secret keys of RLCE in polynomial time
- Ephemeral key recovery using index calculus method
- An improved recovery algorithm for decayed AES key schedule images
- Efficient key recovery for all HFE signature variants
- An optimal key enumeration algorithm and its application to side-channel attacks
- Quantum key search with side channel advice
- Fast and memory-efficient key recovery in side-channel attacks
- Cryptographic Side-Channels from Low-Power Cache Memory
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note
- Counting Keys in Parallel After a Side Channel Attack
- Characterisation and estimation of the key rank distribution in the context of side channel evaluations
- A direct key recovery attack on SIDH
- An efficient key recovery attack on SIDH
- Theoretical security evaluation against side-channel cube attack with key enumeration
- A way to improve the key recovery accuracy based on dynamic programming
- Practical Key-Recovery for All Possible Parameters of SFLASH
- Differential bias attack for block cipher under randomized leakage with key enumeration
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
This page was built for publication: Fast and memory-efficient key recovery in side-channel attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807219)