Publication:4425684

From MaRDI portal


zbMath1019.68541MaRDI QIDQ4425684

No author found.

Publication date: 11 September 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2523/25230013.htm


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks, Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks, Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration, Online Template Attack on ECDSA:, When Similarities Among Devices are Taken for Granted: Another Look at Portability, SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA, Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis, Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks, Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection, Masking the GLP lattice-based signature scheme at any order, Improved power analysis attacks on Falcon, Focus is key to success: a focal loss function for deep learning-based side-channel analysis, On the evaluation of deep learning-based side-channel analysis, ASCA vs. SASCA. A closer look at the AES key schedule, On the feasibility of single-trace attacks on the Gaussian sampler using a CDT, Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}, Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks, A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding, A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial, Learning with physical rounding for linear and quadratic leakage functions, Revisiting security estimation for LWE with hints from a geometric perspective, Redefining the transparency order, Mutual information analysis: a comprehensive study, On the optimality and practicability of mutual information analysis in some scenarios, Fuzzy matching template attacks on multivariate cryptography: a case study, On the influence of optimizers in deep learning-based side-channel analysis, The distributions of individual bits in the output of multiplicative operations, Masking and leakage-resilient primitives: one, the other(s) or both?, Physical attacks and beyond, Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Attacking embedded ECC implementations through CMOV side channels, Lattice attacks against elliptic-curve signatures with blinded scalar multiplication, Two improved multiple-differential collision attacks, Sliding-window correlation attacks against encryption devices with an unstable clock, Assessing the feasibility of single trace power analysis of Frodo, Profiled power analysis attacks using convolutional neural networks with domain knowledge, Categorising and comparing cluster-based DPA distinguishers, Statistical properties of side-channel and fault injection attacks using coding theory, White-box cryptography: don't forget about grey-box attacks, Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version, Fault template attacks on block ciphers exploiting fault propagation, Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle, LWE with side information: attacks and concrete security estimation, Learning-based side-channel analysis on PIPO, A template attack to reconstruct the input of SHA-3 on an 8-bit device, Wavelet scattering transform and ensemble methods for side-channel analysis, \textsf{Scatter}: a missing case?, On the implementation efficiency of linear regression-based side-channel attacks, Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis, Online performance evaluation of deep learning networks for profiled side-channel analysis, Towards tight random probing security, First full-fledged side channel attack on HMAC-SHA-2, Security analysis of deterministic re-keying with masking and shuffling: application to ISAP, Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices, A novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulators, On the exact relationship between the mutual information metric and the success rate metric, Acoustic cryptanalysis, Differential power analysis of stream ciphers with LFSRs, Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice, Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems, Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs, Localized Electromagnetic Analysis of Cryptographic Implementations, A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models, Partial Key Exposure Attack on CRT-RSA, On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages, Boosting Higher-Order Correlation Attacks by Dimensionality Reduction, A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks, Ridge-Based Profiled Differential Power Analysis, Improving Differential Power Analysis by Elastic Alignment, Affine Masking against Higher-Order Side Channel Analysis, PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology, Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks, Score-Based vs. Probability-Based Enumeration – A Cautionary Note, Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures, SCATTER: A New Dimension in Side-Channel, Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces, On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, A Leakage-Resilient Mode of Operation, Random Order m-ary Exponentiation, On the Exact Success Rate of Side Channel Analysis in the Gaussian Model