scientific article; zbMATH DE number 1979273
From MaRDI portal
Publication:4425685
zbMath1019.68535MaRDI QIDQ4425685
No author found.
Publication date: 11 September 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2523/25230029.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (34)
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor ⋮ A First-Order Leak-Free Masking Countermeasure ⋮ Localized Electromagnetic Analysis of Cryptographic Implementations ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ Differential power analysis of stream ciphers with LFSRs ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Power attacks on a side-channel resistant elliptic curve implementation ⋮ Design methodology and validity verification for a reactive countermeasure against EM attacks ⋮ Acoustic cryptanalysis ⋮ SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ Fault Attacks on Public Key Elements: Application to DLP-Based Schemes ⋮ Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities ⋮ On the exact relationship between the mutual information metric and the success rate metric ⋮ See-in-the-middle attacks on blockciphers ARIA and DEFAULT ⋮ Physical attacks and beyond ⋮ Elliptic curve cryptography: the serpentine course of a paradigm shift ⋮ Polar differential power attacks and evaluation ⋮ Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers ⋮ Hiding Higher-Order Side-Channel Leakage ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA ⋮ Protecting Triple-DES Against DPA ⋮ Detecting Flawed Masking Schemes with Leakage Detection Tests ⋮ Cryptographic Side-Channels from Low-Power Cache Memory ⋮ A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks ⋮ Constructive and destructive use of compilers in elliptic curve cryptography ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Improved see-in-the-middle attacks on AES ⋮ Wavelet scattering transform and ensemble methods for side-channel analysis ⋮ Online performance evaluation of deep learning networks for profiled side-channel analysis
This page was built for publication: