Pages that link to "Item:Q3600221"
From MaRDI portal
The following pages link to On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme (Q3600221):
Displaying 15 items.
- A practical attack on KeeLoq (Q421044) (← links)
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- Robust and efficient authentication scheme for session initiation protocol (Q1666852) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Uniform first-order threshold implementations (Q1698616) (← links)
- Keymill: side-channel resilient key generator, a new concept for SCA-security by design (Q1698634) (← links)
- Spin me right round rotational symmetry for FPGA-specific AES: extended version (Q2188965) (← links)
- Affine Equivalence and Its Application to Tightening Threshold Implementations (Q2807212) (← links)
- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures (Q2889990) (← links)
- Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs (Q2889992) (← links)
- Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms (Q2947109) (← links)
- Side-Channel Analysis Protection and Low-Latency in Action (Q2958135) (← links)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not (Q2958149) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits (Q6652926) (← links)