Side channel cryptanalysis of product ciphers
From MaRDI portal
Publication:5862295
Recommendations
Cites work
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 177050 (Why is no real title available?)
- scientific article; zbMATH DE number 1024042 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1455081 (Why is no real title available?)
- scientific article; zbMATH DE number 1498335 (Why is no real title available?)
- scientific article; zbMATH DE number 820502 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1424183 (Why is no real title available?)
- A Simple Unpredictable Pseudo-Random Number Generator
- Differential cryptanalysis of DES-like cryptosystems
- Fast Software Encryption Functions
- Markov Ciphers and Differential Cryptanalysis
- New types of cryptanalytic attacks using related keys
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(26)- Foundations of Security Analysis and Design III
- Applied Cryptography and Network Security
- Novel true random number generator based hardware cryptographic architecture using quantum-dot cellular automata
- Guest editorial
- Efficient cache attacks on AES, and countermeasures
- Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7--10, 2011. Proceedings
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
- Using the joint distributions of a cryptographic function in side channel analysis
- Impact of extending side channel attack on cipher variants: a case study with the HC series of stream ciphers
- scientific article; zbMATH DE number 1866859 (Why is no real title available?)
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- A heuristic approach to assist side channel analysis of the data encryption standard
- Side-channel analysis of six SHA-3 candidates
- Survey of information security
- scientific article; zbMATH DE number 2089143 (Why is no real title available?)
- Side Channel Attacks on Irregularly Decimated Generators
- Improving side-channel attacks by exploiting substitution bpxes properties
- Yet Another Attack on Vest
- scientific article; zbMATH DE number 1882021 (Why is no real title available?)
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- When should an implementation attack be viewed as successful?
- AMASIVE: an adaptable and modular autonomous side-channel vulnerability evaluation framework
- scientific article; zbMATH DE number 1759295 (Why is no real title available?)
- Hidden Markov model cryptanalysis.
- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
This page was built for publication: Side channel cryptanalysis of product ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5862295)