On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
From MaRDI portal
Publication:3600221
DOI10.1007/978-3-540-85174-5_12zbMath1183.94032OpenAlexW1495989020MaRDI QIDQ3600221
Mohammad Taghi Manzuri Shalmani, Amir Moradi, Christof Paar, Thomas Eisenbarth, Timo Kasper, Mahmoud Salmasizadeh
Publication date: 10 February 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_12
Related Items (14)
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures ⋮ Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs ⋮ Robust and efficient authentication scheme for session initiation protocol ⋮ Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ A practical attack on KeeLoq ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Uniform first-order threshold implementations ⋮ Keymill: side-channel resilient key generator, a new concept for SCA-security by design ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ Affine Equivalence and Its Application to Tightening Threshold Implementations ⋮ A Leakage-Resilient Mode of Operation
Cites Work
This page was built for publication: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme