Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
From MaRDI portal
Publication:3533964
DOI10.1007/978-3-540-88313-5_33zbMATH Open1481.94084OpenAlexW1795786057MaRDI QIDQ3533964FDOQ3533964
Authors: Michael Backes, Boris Köpf
Publication date: 27 October 2008
Published in: Computer Security - ESORICS 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88313-5_33
Recommendations
- Adaptive chosen-message side-channel attacks
- Side channel cryptanalysis of product ciphers
- How to certify the leakage of a chip?
- A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
Cited In (7)
- LWE with side information: attacks and concrete security estimation
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- Asymptotic information leakage under one-try attacks
- Searching secrets rationally
- Quantitative mitigation of timing side channels
- Leakage resilient value comparison with application to message authentication
- Adaptive chosen-message side-channel attacks
This page was built for publication: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3533964)