Sliding-window correlation attacks against encryption devices with an unstable clock
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1759298 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Acoustic cryptanalysis
- Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Getting more from PCA: First results of using principal component analysis for extensive power analysis
- Improving differential power analysis by elastic alignment
- Power Analysis Attacks
- Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(2)
This page was built for publication: Sliding-window correlation attacks against encryption devices with an unstable clock
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1726674)