Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
From MaRDI portal
Publication:2938848
DOI10.1007/978-3-662-45611-8_13zbMath1306.94074OpenAlexW2209429603MaRDI QIDQ2938848
Elisabeth Oswald, Luke Mather, Carolyn Whitnall
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_13
Related Items (5)
Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Fast and Memory-Efficient Key Recovery in Side-Channel Attacks ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
This page was built for publication: Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer