The following pages link to (Q4425685):
Displaying 39 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Polar differential power attacks and evaluation (Q439840) (← links)
- Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA (Q656510) (← links)
- Correlation power analysis and higher-order masking implementation of WAGE (Q832394) (← links)
- Constructive and destructive use of compilers in elliptic curve cryptography (Q1015356) (← links)
- Physical attacks and beyond (Q1698608) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Improved see-in-the-middle attacks on AES (Q2104443) (← links)
- Wavelet scattering transform and ensemble methods for side-channel analysis (Q2106686) (← links)
- Online performance evaluation of deep learning networks for profiled side-channel analysis (Q2106696) (← links)
- On the exact relationship between the mutual information metric and the success rate metric (Q2195409) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Power attacks on a side-channel resistant elliptic curve implementation (Q2390277) (← links)
- Design methodology and validity verification for a reactive countermeasure against EM attacks (Q2397443) (← links)
- Acoustic cryptanalysis (Q2397444) (← links)
- Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities (Q2424888) (← links)
- Elliptic curve cryptography: the serpentine course of a paradigm shift (Q2430981) (← links)
- Differential power analysis of stream ciphers with LFSRs (Q2629409) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Localized Electromagnetic Analysis of Cryptographic Implementations (Q2890009) (← links)
- Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers (Q2975800) (← links)
- Hiding Higher-Order Side-Channel Leakage (Q2975801) (← links)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks (Q2975813) (← links)
- Protecting Triple-DES Against DPA (Q3297558) (← links)
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis (Q3452233) (← links)
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes (Q3506358) (← links)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450) (← links)
- Detecting Flawed Masking Schemes with Leakage Detection Tests (Q4639478) (← links)
- Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor (Q5040408) (← links)
- SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA (Q5094735) (← links)
- Cryptographic Side-Channels from Low-Power Cache Memory (Q5447515) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6113953) (← links)
- Side-Channel Attacks Meet Secure Network Protocols (Q6487213) (← links)
- Convolutional neural network based side-channel attacks with customized filters (Q6536242) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6544463) (← links)
- Leakage-resilient attribute-based encryption with attribute-hiding (Q6547896) (← links)
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing (Q6652995) (← links)
- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences (Q6652998) (← links)