Security Evaluations beyond Computing Power
From MaRDI portal
Publication:4924407
DOI10.1007/978-3-642-38348-9_8zbMath1306.94095OpenAlexW1687247511MaRDI QIDQ4924407
Benoît Gérard, Nicolas Veyrat-Charvillon, François-Xavier Standaert
Publication date: 31 May 2013
Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_8
Related Items (9)
Score-Based vs. Probability-Based Enumeration – A Cautionary Note ⋮ On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Quantum key search with side channel advice ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration ⋮ Persistent fault analysis with few encryptions
This page was built for publication: Security Evaluations beyond Computing Power