How to Compare Profiled Side-Channel Attacks?
From MaRDI portal
Publication:3630249
DOI10.1007/978-3-642-01957-9_30zbMATH Open1284.94112DBLPconf/acns/StandaertKS09OpenAlexW1797487015WikidataQ58765237 ScholiaQ58765237MaRDI QIDQ3630249FDOQ3630249
Authors: François Koeune, Werner Schindler, François-Xavier Standaert
Publication date: 3 June 2009
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01957-9_30
Recommendations
Cited In (9)
- Security evaluation of cryptographic modules against profiling attacks
- Behind the scene of side channel attacks
- A time series approach for profiling attack
- Ridge-based profiled differential power analysis
- Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis
- Profiling DPA: efficacy and efficiency trade-offs
- Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator
- Template attacks on different devices
- Robust profiling for DPA-style attacks
This page was built for publication: How to Compare Profiled Side-Channel Attacks?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3630249)