Characterisation and estimation of the key rank distribution in the context of side channel evaluations
From MaRDI portal
Publication:2958136
Recommendations
- Simpler and more efficient rank estimation for side-channel security assessment
- Poly-logarithmic side channel rank estimation via exponential sampling
- Fast analytical rank estimation
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
- Counting Keys in Parallel After a Side Channel Attack
Cites work
- scientific article; zbMATH DE number 3782216 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A practitioner's guide to resampling for data analysis, data mining, and modeling
- A statistical model for DPA with novel algorithmic confusion analysis
- An optimal key enumeration algorithm and its application to side-channel attacks
- Counting Keys in Parallel After a Side Channel Attack
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Fast and memory-efficient key recovery in side-channel attacks
- Making Masking Security Proofs Concrete
- On the Distribution of a Positive Random Variable Having a Discrete Probability Mass at the Origin
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
- Simpler and more efficient rank estimation for side-channel security assessment
- Statistical Analysis of Second Order Differential Power Analysis
- Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
Cited in
(10)- Simpler and more efficient rank estimation for side-channel security assessment
- Quantum key search with side channel advice
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note
- Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
- Fast analytical rank estimation
- Poly-logarithmic side channel rank estimation via exponential sampling
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
- Leakage certification made simple
- On the evaluation of deep learning-based side-channel analysis
This page was built for publication: Characterisation and estimation of the key rank distribution in the context of side channel evaluations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2958136)