Online template attacks
From MaRDI portal
Publication:2945368
DOI10.1007/978-3-319-13039-2_2zbMATH Open1344.94030OpenAlexW1752434584MaRDI QIDQ2945368FDOQ2945368
Authors: Lejla Batina, Łukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
Publication date: 10 September 2015
Published in: Progress in Cryptology -- INDOCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-13039-2_2
Recommendations
Cited In (7)
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Assessing the feasibility of single trace power analysis of Frodo
- Protecting the most significant bits in scalar multiplication algorithms
- Online template attack on ECDSA: extracting keys via the other side
- Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
- Attacking embedded ECC implementations through CMOV side channels
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
This page was built for publication: Online template attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2945368)