Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
From MaRDI portal
Publication:3583443
DOI10.1007/978-3-642-15031-9_7zbMATH Open1297.94061OpenAlexW2125025555MaRDI QIDQ3583443FDOQ3583443
Authors: Jean-Sébastien Coron, Ilya Kizhvatov
Publication date: 17 August 2010
Published in: Cryptographic Hardware and Embedded Systems, CHES 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-15031-9_7
Recommendations
- Performance analysis of chaotic DSSS-CDMA synchronization under jamming attack
- Desynchronization chaos shift keying method based on the error second derivative and its security analysis
- Cryptanalysis of a chaos block cipher for wireless sensor network
- Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
Cited In (6)
- \textsf{Scatter}: a missing case?
- An Efficient Method for Random Delay Generation in Embedded Software
- An efficient method for eliminating random delays in power traces of embedded software
- Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
- Unifying leakage models: from probing attacks to noisy leakage
- Two improved multiple-differential collision attacks
This page was built for publication: Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3583443)