Leakage certification made simple
From MaRDI portal
Publication:6652997
Cites work
- scientific article; zbMATH DE number 1092005 (Why is no real title available?)
- A formal study of power variability issues and side-channel attacks for nanoscale devices
- A systematic appraisal of side channel evaluation strategies
- Characterisation and estimation of the key rank distribution in the context of side channel evaluations
- Convergence properties of functional estimates for discrete distributions
- Density-free convergence properties of various estimators of entropy
- Estimation of the information by an adaptive partitioning of the observation space
- Good is not good enough. Deriving optimal distinguishers from communication theory
- How to certify the leakage of a chip?
- Leakage certification revisited: bounding model errors in side-channel security evaluations
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Masking against Side-Channel Attacks: A Formal Security Proof
- Masking proofs are tight and how to exploit it in security evaluations
- Mutual information analysis: a comprehensive study
- On the estimation of entropy
- Sample estimate of the entropy of a random vector
- Statistical Analysis of Second Order Differential Power Analysis
- The Kolmogorov-Smirnov Test for Goodness of Fit
This page was built for publication: Leakage certification made simple
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652997)