Leakage certification made simple
From MaRDI portal
Publication:6652997
DOI10.1007/978-3-031-68391-6_13MaRDI QIDQ6652997FDOQ6652997
Authors: Aakash Chowdhury, Arnab Roy, Carlo Brunetta, Elisabeth Oswald
Publication date: 13 December 2024
Cites Work
- Sample estimate of the entropy of a random vector
- On the estimation of entropy
- Statistical Analysis of Second Order Differential Power Analysis
- The Kolmogorov-Smirnov Test for Goodness of Fit
- Title not available (Why is that?)
- Estimation of the information by an adaptive partitioning of the observation space
- Mutual information analysis: a comprehensive study
- Convergence properties of functional estimates for discrete distributions
- Density-free convergence properties of various estimators of entropy
- Good is not good enough. Deriving optimal distinguishers from communication theory
- How to certify the leakage of a chip?
- A formal study of power variability issues and side-channel attacks for nanoscale devices
- Masking against Side-Channel Attacks: A Formal Security Proof
- Masking proofs are tight and how to exploit it in security evaluations
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Characterisation and estimation of the key rank distribution in the context of side channel evaluations
- A systematic appraisal of side channel evaluation strategies
- Leakage certification revisited: bounding model errors in side-channel security evaluations
This page was built for publication: Leakage certification made simple
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652997)