Pages that link to "Item:Q4974947"
From MaRDI portal
The following pages link to Statistical Analysis of Second Order Differential Power Analysis (Q4974947):
Displaying 26 items.
- Complementary dual codes for counter-measures to side-channel attacks (Q259280) (← links)
- Redefining the transparency order (Q510458) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks (Q1698614) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Multivariate high-order attacks of shuffled tables recomputation (Q1753166) (← links)
- \textsf{Scatter}: a missing case? (Q2106687) (← links)
- On the implementation efficiency of linear regression-based side-channel attacks (Q2106690) (← links)
- Spin me right round rotational symmetry for FPGA-specific AES: extended version (Q2188965) (← links)
- On some connections between statistics and cryptology (Q2437860) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Higher-Order Side Channel Security and Mask Refreshing (Q2946888) (← links)
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction (Q2946987) (← links)
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations (Q2958136) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Affine Masking against Higher-Order Side Channel Analysis (Q3084260) (← links)
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks (Q3104720) (← links)
- On the Use of Independent Component Analysis to Denoise Side-Channel Measurements (Q3297552) (← links)
- SCATTER: A New Dimension in Side-Channel (Q3297554) (← links)
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks (Q4639480) (← links)
- Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis (Q5094763) (← links)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889) (← links)
- Codes for Side-Channel Attacks and Protections (Q5739021) (← links)
- Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs (Q6054729) (← links)
- Secure Implementation of Lattice-Based Encryption Schemes (Q6181721) (← links)