Assessing the feasibility of single trace power analysis of Frodo
From MaRDI portal
Publication:1726676
DOI10.1007/978-3-030-10970-7_10zbMath1447.94021OpenAlexW2889132688MaRDI QIDQ1726676
Marco Martinoli, Joppe W. Bos, Martijn Stam, Simon Friedberger, Elisabeth Oswald
Publication date: 20 February 2019
Full work available at URL: https://zenodo.org/record/2594575
Related Items (4)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 ⋮ Revisiting security estimation for LWE with hints from a geometric perspective ⋮ LWE with side information: attacks and concrete security estimation
Uses Software
Cites Work
- Unnamed Item
- On the concrete hardness of learning with errors
- Worst-case to average-case reductions for module lattices
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
- Online Template Attacks
- Stochastic Resonance
- On Ideal Lattices and Learning with Errors over Rings
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
- Cryptographic Hardware and Embedded Systems - CHES 2004
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Assessing the feasibility of single trace power analysis of Frodo