On the Security of RSM - Presenting 5 First- and Second-Order Attacks
From MaRDI portal
Publication:2794598
DOI10.1007/978-3-319-10175-0_20zbMath1440.94063OpenAlexW86628513MaRDI QIDQ2794598
Sebastian Kutzner, Axel Poschmann
Publication date: 10 March 2016
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-10175-0_20
Related Items (2)
Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Threshold Implementation in Software
Cites Work
- Unnamed Item
- Unnamed Item
- Side-channel resistant crypto for less than 2,300 GE
- Improved Collision-Correlation Power Analysis on First Order Protected AES
- A new table of constant weight codes
- Complementary Dual Codes for Counter-Measures to Side-Channel Attacks
- Correlation-Enhanced Power Analysis Collision Attack
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
This page was built for publication: On the Security of RSM - Presenting 5 First- and Second-Order Attacks