Improving DPA by peak distribution analysis
From MaRDI portal
Publication:3084258
DOI10.1007/978-3-642-19574-7_17zbMATH Open1293.94092OpenAlexW1582924416MaRDI QIDQ3084258FDOQ3084258
Authors: Jing Pan, Jasper G. J. van Woudenberg, Jerry den Hartog, Marc F. Witteman
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_17
Recommendations
Cites Work
- Title not available (Why is that?)
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Power Analysis Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2004
- Improving differential power analysis by elastic alignment
Cited In (9)
- Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis
- An optimal key enumeration algorithm and its application to side-channel attacks
- Fast and memory-efficient key recovery in side-channel attacks
- Quantum key search with side channel advice
- Title not available (Why is that?)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
- Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer
- PKDPA: An enhanced probabilistic differential power attack methodology
- On the exact relationship between the mutual information metric and the success rate metric
This page was built for publication: Improving DPA by peak distribution analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084258)