An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
From MaRDI portal
Publication:3455513
DOI10.1007/978-3-642-35999-6_25zbMath1327.94078OpenAlexW1710934224WikidataQ58765076 ScholiaQ58765076MaRDI QIDQ3455513
Benoît Gérard, Nicolas Veyrat-Charvillon, M. Renauld, François-Xavier Standaert
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_25
Related Items (11)
Score-Based vs. Probability-Based Enumeration – A Cautionary Note ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research ⋮ Fast and Memory-Efficient Key Recovery in Side-Channel Attacks ⋮ Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration ⋮ A template attack to reconstruct the input of SHA-3 on an 8-bit device
Cites Work
- Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24--26, 2003. Revised papers
- Cryptographic hardware and embedded systems -- CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11--13, 2004. Proceedings.
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- Algebraic Side-Channel Attacks
- Improving DPA by Peak Distribution Analysis
- Algebraic Side-Channel Analysis in the Presence of Errors
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Improved Side-Channel Collision Attacks on AES
- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
- Selecting cryptographic key sizes
This page was built for publication: An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks