Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1759297 - MaRDI portal

scientific article; zbMATH DE number 1759297

From MaRDI portal
Publication:4536229

zbMath0998.94538MaRDI QIDQ4536229

Thomas S. Messerges

Publication date: 28 November 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (27)

Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power TracesProtecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stagePower attacks on a side-channel resistant elliptic curve implementationSide-channel attacks countermeasure based on decomposed S-boxes for KuznyechikOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesNear Collision Attack on the Grain v1 Stream CipherHigher-Order Glitch Resistant Implementation of the PRESENT S-BoxRevisiting mutual information analysis: multidimensionality, neural estimation and optimality proofsComplete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacksToward reverse engineering on secret \(S\)-boxes in block ciphersTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsHigher-order masking scheme for Trivium hardware implementationHigher-order masked SaberFirst-order side channel attacks on Zhang's countermeasuresPolar differential power attacks and evaluationTime-Memory Trade-Offs for Side-Channel Resistant Implementations of Block CiphersMutual information analysis: a comprehensive studySCATTER: A New Dimension in Side-ChannelMontgomery’s Trick and Fast Implementation of Masked AESStatistical properties of side-channel and fault injection attacks using coding theoryMultivariate high-order attacks of shuffled tables recomputationWhite-box cryptography: don't forget about grey-box attacksOn two DES implementations secure against differential power analysis in smart-cardsHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONPolynomial Evaluation and Side Channel AnalysisAn Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash FunctionsAffine Masking against Higher-Order Side Channel Analysis




This page was built for publication: