How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
From MaRDI portal
Publication:5265065
DOI10.1007/978-3-662-44709-3_3zbMATH Open1383.94030OpenAlexW70373061MaRDI QIDQ5265065FDOQ5265065
Emmanuel Prouff, Matthieu Rivain, Victor Lomné, Adrian Thillard, Thomas Roche
Publication date: 21 July 2015
Published in: Advanced Information Systems Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44709-3_3
Cited In (7)
- On the implementation efficiency of linear regression-based side-channel attacks
- SCATTER: A New Dimension in Side-Channel
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- From substitution box to threshold
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
- On the exact relationship between the mutual information metric and the success rate metric
Recommendations
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model 👍 👎
- A Key to Success 👍 👎
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment 👍 👎
- Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack 👍 👎
- Public Key Cryptography - PKC 2005 👍 👎
- Applied Cryptography and Network Security 👍 👎
This page was built for publication: How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5265065)