ASCA vs. SASCA. A closer look at the AES key schedule
From MaRDI portal
Publication:6088704
DOI10.1007/978-3-031-29497-6_4zbMath1526.94041MaRDI QIDQ6088704
Silvan Streit, Emanuele Strieder, Manuel Ilg, Florian Unterstein, Johann Heyszl
Publication date: 16 November 2023
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- A multi-round side channel attack on AES using belief propagation
- Simple key enumeration (and rank estimation) using histograms: an integrated approach
- Practical algebraic side-channel attacks against ACORN
- More practical single-trace attacks on the number theoretic transform
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- Soft Analytical Side-Channel Attacks
- Algebraic Side-Channel Attacks
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- Fault-enabled chosen-ciphertext attacks on Kyber
This page was built for publication: ASCA vs. SASCA. A closer look at the AES key schedule