The following pages link to Power Analysis Attacks (Q5201284):
Displaying 50 items.
- First-order side channel attacks on Zhang's countermeasures (Q433061) (← links)
- Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software (Q477664) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Secure hardware implementation of nonlinear functions in the presence of glitches (Q656517) (← links)
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Correlation power analysis and higher-order masking implementation of WAGE (Q832394) (← links)
- On the influence of optimizers in deep learning-based side-channel analysis (Q832396) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- The distributions of individual bits in the output of multiplicative operations (Q892279) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks (Q1698614) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Two improved multiple-differential collision attacks (Q1717875) (← links)
- Sliding-window correlation attacks against encryption devices with an unstable clock (Q1726674) (← links)
- Profiled power analysis attacks using convolutional neural networks with domain knowledge (Q1726696) (← links)
- Quantum key search with side channel advice (Q1746986) (← links)
- Categorising and comparing cluster-based DPA distinguishers (Q1746989) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- \textsf{Scatter}: a missing case? (Q2106687) (← links)
- Differential power analysis of the Picnic signature scheme (Q2118537) (← links)
- Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) (Q2120987) (← links)
- On using RSA/ECC coprocessor for ideal lattice-based key exchange (Q2145301) (← links)
- Side-channeling the \textsf{Kalyna} key expansion (Q2152165) (← links)
- Spin me right round rotational symmetry for FPGA-specific AES: extended version (Q2188965) (← links)
- On the exact relationship between the mutual information metric and the success rate metric (Q2195409) (← links)
- Novel true random number generator based hardware cryptographic architecture using quantum-dot cellular automata (Q2322224) (← links)
- Hadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights (Q2324768) (← links)
- Transparency order for Boolean functions: analysis and construction (Q2324785) (← links)
- Design methodology and validity verification for a reactive countermeasure against EM attacks (Q2397443) (← links)
- Acoustic cryptanalysis (Q2397444) (← links)
- Side-channel cryptographic attacks using pseudo-Boolean optimization (Q2398519) (← links)
- Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities (Q2424888) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece'' hardware reference implementation (Q2692373) (← links)
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON (Q2790039) (← links)
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace (Q2790057) (← links)
- Differential Power Analysis of a McEliece Cryptosystem (Q2794516) (← links)
- Arithmetic Addition over Boolean Masking (Q2794517) (← links)
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers (Q2794562) (← links)
- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance (Q2794567) (← links)
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research (Q2794592) (← links)
- On the Security of RSM - Presenting 5 First- and Second-Order Attacks (Q2794598) (← links)
- Buying AES Design Resistance with Speed and Energy (Q2803624) (← links)
- Photonic Power Firewalls (Q2803641) (← links)
- Affine Equivalence and Its Application to Tightening Threshold Implementations (Q2807212) (← links)
- Near Collision Side Channel Attacks (Q2807214) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Localized Electromagnetic Analysis of Cryptographic Implementations (Q2890009) (← links)