Mutual Information Analysis: How, When and Why?
From MaRDI portal
Publication:3642947
DOI10.1007/978-3-642-04138-9_30zbMath1290.94135OpenAlexW1740609432WikidataQ58765241 ScholiaQ58765241MaRDI QIDQ3642947
Nicolas Veyrat-Charvillon, François-Xavier Standaert
Publication date: 10 November 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04138-9_30
Related Items (13)
A First-Order Leak-Free Masking Countermeasure ⋮ Relations between entropy rate, entropy production and information geometry in linear stochastic systems ⋮ Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs ⋮ On the exact relationship between the mutual information metric and the success rate metric ⋮ Polar differential power attacks and evaluation ⋮ Ordinal synchronization: using ordinal patterns to capture interdependencies between time series ⋮ Mutual information analysis: a comprehensive study ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ On the optimality and practicability of mutual information analysis in some scenarios ⋮ A Theoretical Study of Kolmogorov-Smirnov Distinguishers ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ Different coefficients for studying dependence
This page was built for publication: Mutual Information Analysis: How, When and Why?