Improving DPA by peak distribution analysis
From MaRDI portal
Publication:3084258
Recommendations
Cites work
- scientific article; zbMATH DE number 5542185 (Why is no real title available?)
- scientific article; zbMATH DE number 1950622 (Why is no real title available?)
- scientific article; zbMATH DE number 1759298 (Why is no real title available?)
- scientific article; zbMATH DE number 1857508 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Improving differential power analysis by elastic alignment
- Power Analysis Attacks
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Topics in Cryptology – CT-RSA 2004
Cited in
(9)- Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis
- An optimal key enumeration algorithm and its application to side-channel attacks
- Quantum key search with side channel advice
- Fast and memory-efficient key recovery in side-channel attacks
- scientific article; zbMATH DE number 1950622 (Why is no real title available?)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer
- PKDPA: An enhanced probabilistic differential power attack methodology
- On the exact relationship between the mutual information metric and the success rate metric
This page was built for publication: Improving DPA by peak distribution analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084258)