Complete SCARE of AES-like block ciphers by chosen plaintext collision power analysis
From MaRDI portal
Publication:2872046
DOI10.1007/978-3-319-03515-4_8zbMATH Open1295.94041OpenAlexW7269763MaRDI QIDQ2872046FDOQ2872046
Authors: Christophe Clavier, Quentin Isorez, Antoine Wurcker
Publication date: 14 January 2014
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-03515-4_8
Recommendations
Cited In (5)
- SCARE of the DES
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
- Towards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitations
- My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses
- Defeating any secret cryptography with SCARE attacks
This page was built for publication: Complete SCARE of AES-like block ciphers by chosen plaintext collision power analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2872046)