Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
From MaRDI portal
Publication:3642922
DOI10.1007/978-3-642-04138-9_8zbMath1290.94123OpenAlexW1794592934WikidataQ58765232 ScholiaQ58765232MaRDI QIDQ3642922
Nicolas Veyrat-Charvillon, M. Renauld, François-Xavier Standaert
Publication date: 10 November 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04138-9_8
Related Items (12)
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks ⋮ Side-channel cryptographic attacks using pseudo-Boolean optimization ⋮ Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ ASCA vs. SASCA. A closer look at the AES key schedule ⋮ Polar differential power attacks and evaluation ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES ⋮ Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns ⋮ Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration ⋮ Single-trace side-channel analysis on polynomial-based MAC schemes
This page was built for publication: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA