Power Analysis Attacks
From MaRDI portal
Publication:5201284
Recommendations
Cited in
(only showing first 100 items - show all)- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- PKDPA: An enhanced probabilistic differential power attack methodology
- Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)
- The distributions of individual bits in the output of multiplicative operations
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- On efficient leakage-resilient pseudorandom functions with hard-to-invert leakages
- Faster Addition and Doubling on Elliptic Curves
- First-order side channel attacks on Zhang's countermeasures
- scientific article; zbMATH DE number 1857508 (Why is no real title available?)
- Spectral approach for correlation power analysis
- Side-channel analysis of embedded systems. An efficient algorithmic approach
- Correlation power analysis and higher-order masking implementation of WAGE
- On the influence of optimizers in deep learning-based side-channel analysis
- Differential power analysis of the Picnic signature scheme
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
- Side-channel cryptographic attacks using pseudo-Boolean optimization
- Combined attack on CRT-RSA. Why public verification must not be public?
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Threshold implementations of small S-boxes
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- Chipwhisperer: an open-source platform for hardware embedded security research
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
- On the exact relationship between the mutual information metric and the success rate metric
- Masking tables -- an underestimated security risk
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Novel true random number generator based hardware cryptographic architecture using quantum-dot cellular automata
- scientific article; zbMATH DE number 1759284 (Why is no real title available?)
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- Higher-order masking in practice: a vector implementation of masked AES for ARM NEON
- Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
- On the security of RSM -- presenting 5 first -- and second-order attacks
- Transparency order for Boolean functions: analysis and construction
- An Analysis of Goubin’s Refined Power Analysis Attack
- A theoretical study of Kolmogorov-Smirnov distinguishers
- Sliding-window correlation attacks against encryption devices with an unstable clock
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- There is wisdom in harnessing the strengths of your enemy: customized encoding to thwart side-channel attacks
- Hadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights
- On the evaluation of deep learning-based side-channel analysis
- Side-channeling the \textsf{Kalyna} key expansion
- Unifying leakage models: from probing attacks to noisy leakage
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Design methodology and validity verification for a reactive countermeasure against EM attacks
- Two improved multiple-differential collision attacks
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- Spin me right round rotational symmetry for FPGA-specific AES: extended version
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Quantum key search with side channel advice
- Improving differential power analysis by elastic alignment
- Categorising and comparing cluster-based DPA distinguishers
- \textsf{Scatter}: a missing case?
- Memory-constrained implementations of elliptic curve cryptography in co-\(Z\) coordinate repre\-sentation
- Exponent Recoding and Regular Exponentiation Algorithms
- Acoustic cryptanalysis
- Complementing Feistel ciphers
- Getting more from PCA: First results of using principal component analysis for extensive power analysis
- Side-channel resistant crypto for less than 2,300 GE
- On using RSA/ECC coprocessor for ideal lattice-based key exchange
- Buying AES design resistance with speed and energy
- DEFAULT: cipher level resistance against differential fault attack
- Localized electromagnetic analysis of cryptographic implementations
- Improving DPA by peak distribution analysis
- Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
- Affine Masking against Higher-Order Side Channel Analysis
- Applied Cryptography and Network Security
- Masking and leakage-resilient primitives: one, the other(s) or both?
- From substitution box to threshold
- Practical Attacks on Masked Hardware
- Arithmetic Addition over Boolean Masking
- Cryptanalysis of a chaotic block cryptographic system against template attacks
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- On the use of independent component analysis to denoise side-channel measurements
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementation in software. Case study of PRESENT
- Learning with physical rounding for linear and quadratic leakage functions
- Remote IP protection using timing channels
- Attacks and security proofs of EAX-prime
- When Similarities Among Devices are Taken for Granted: Another Look at Portability
- Focus is key to success: a focal loss function for deep learning-based side-channel analysis
- Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Susceptibility of UHF RFID Tags to Electromagnetic Analysis
- A lattice attack on CRYSTALS-Kyber with correlation power analysis
- Protecting ring oscillator physical unclonable functions against modeling attacks
- A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
- Affine equivalence and its application to tightening threshold implementations
- Near collision side channel attacks
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
- A Leakage Resilient MAC
- Towards sound fresh re-keying with hard (physical) learning problems
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Stronger lower bounds for leakage-resilient secret sharing
- Multivariate leakage model for improving non-profiling DPA on noisy power traces
- Improved power analysis attacks on Falcon
This page was built for publication: Power Analysis Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5201284)