Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1979273 - MaRDI portal

scientific article; zbMATH DE number 1979273

From MaRDI portal
Publication:4425685

zbMath1019.68535MaRDI QIDQ4425685

No author found.

Publication date: 11 September 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2523/25230029.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (34)

Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser SensorA First-Order Leak-Free Masking CountermeasureLocalized Electromagnetic Analysis of Cryptographic ImplementationsCorrelation power analysis and higher-order masking implementation of WAGEDifferential power analysis of stream ciphers with LFSRsAmplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisLeakage-resilient cryptography from minimal assumptionsPower attacks on a side-channel resistant elliptic curve implementationDesign methodology and validity verification for a reactive countermeasure against EM attacksAcoustic cryptanalysisSM4 Chaotic Masking Scheme Against Power Analysis Based on FPGALeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesFault Attacks on Public Key Elements: Application to DLP-Based SchemesGeneralized probabilistic satisfiability and applications to modelling attackers with side-channel capabilitiesOn the exact relationship between the mutual information metric and the success rate metricSee-in-the-middle attacks on blockciphers ARIA and DEFAULTPhysical attacks and beyondElliptic curve cryptography: the serpentine course of a paradigm shiftPolar differential power attacks and evaluationTime-Memory Trade-Offs for Side-Channel Resistant Implementations of Block CiphersHiding Higher-Order Side-Channel LeakageA Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel AttacksGlitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGAProtecting Triple-DES Against DPADetecting Flawed Masking Schemes with Leakage Detection TestsCryptographic Side-Channels from Low-Power Cache MemoryA Unified Framework for the Analysis of Side-Channel Key Recovery AttacksConstructive and destructive use of compilers in elliptic curve cryptographyLocally decodable and updatable non-malleable codes and their applicationsThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeBig-Key Symmetric Encryption: Resisting Key ExfiltrationImproved see-in-the-middle attacks on AESWavelet scattering transform and ensemble methods for side-channel analysisOnline performance evaluation of deep learning networks for profiled side-channel analysis




This page was built for publication: