Localized Electromagnetic Analysis of Cryptographic Implementations
From MaRDI portal
Publication:2890009
DOI10.1007/978-3-642-27954-6_15zbMath1292.94077OpenAlexW59374396MaRDI QIDQ2890009
Benedikt Heinz, Johann Heyszl, Frederic Stumpf, Stefan Mangard, Georg Sigl
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-27954-6_15
Related Items (6)
Key Bit-Dependent Attack on Protected PKC Using a Single Trace ⋮ Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Defeating RSA Multiply-Always and Message Blinding Countermeasures
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Correlation-Enhanced Power Analysis Collision Attack
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Fast Software Encryption
This page was built for publication: Localized Electromagnetic Analysis of Cryptographic Implementations