Side channel cryptanalysis of product ciphers
From MaRDI portal
Publication:5862295
DOI10.1007/BFB0055858zbMATH Open1487.94125OpenAlexW1566796882WikidataQ57006347 ScholiaQ57006347MaRDI QIDQ5862295FDOQ5862295
Authors: John Kelsey, Bruce Schneier, David Wagner, Chris Hall
Publication date: 7 March 2022
Published in: Computer Security — ESORICS 98 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bfb0055858
Recommendations
Cites Work
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Simple Unpredictable Pseudo-Random Number Generator
- Title not available (Why is that?)
- Markov Ciphers and Differential Cryptanalysis
- Title not available (Why is that?)
- New types of cryptanalytic attacks using related keys
- Title not available (Why is that?)
- Fast Software Encryption Functions
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (26)
- Novel true random number generator based hardware cryptographic architecture using quantum-dot cellular automata
- Guest editorial
- Efficient cache attacks on AES, and countermeasures
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
- Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7--10, 2011. Proceedings
- Using the joint distributions of a cryptographic function in side channel analysis
- Impact of extending side channel attack on cipher variants: a case study with the HC series of stream ciphers
- Title not available (Why is that?)
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Side-channel analysis of six SHA-3 candidates
- A heuristic approach to assist side channel analysis of the data encryption standard
- Survey of information security
- Title not available (Why is that?)
- Side Channel Attacks on Irregularly Decimated Generators
- Improving side-channel attacks by exploiting substitution bpxes properties
- Yet Another Attack on Vest
- Title not available (Why is that?)
- Title not available (Why is that?)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- When should an implementation attack be viewed as successful?
- AMASIVE: an adaptable and modular autonomous side-channel vulnerability evaluation framework
- Title not available (Why is that?)
- Hidden Markov model cryptanalysis.
- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
- Foundations of Security Analysis and Design III
- Applied Cryptography and Network Security
This page was built for publication: Side channel cryptanalysis of product ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5862295)