A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
From MaRDI portal
Publication:6487212
DOI10.1007/978-3-319-61204-1_21zbMath1521.94062MaRDI QIDQ6487212
Chenyang Tu, Yuan Ma, Lingchen Zhang, Zeyi Liu, Neng Gao
Publication date: 1 July 2022
Cites Work
- Unnamed Item
- Unnamed Item
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- New Lightweight DES Variants
- Adaptive Chosen-Message Side-Channel Attacks
- On Generalized Feistel Networks
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Power Analysis Attacks
- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
- Cryptographic Hardware and Embedded Systems - CHES 2004
This page was built for publication: A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers