A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery
暂无分享,去创建一个
A. Adam Ding | Yunsi Fei | Ziyue Zhang | A. Ding | Yunsi Fei | Ziyue Zhang
[1] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[2] Elisabeth Oswald,et al. Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations , 2016, IACR Cryptol. ePrint Arch..
[3] Elisabeth Oswald,et al. Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.
[4] Tanja Lange,et al. Tighter, faster, simpler side-channel security evaluations beyond computing power , 2015, IACR Cryptol. ePrint Arch..
[5] Liwei Zhang,et al. A statistics-based success rate model for DPA and CPA , 2015, Journal of Cryptographic Engineering.
[6] François-Xavier Standaert,et al. Security Evaluations beyond Computing Power , 2013, EUROCRYPT.
[7] Matthieu Rivain,et al. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.
[8] Romain Poussier,et al. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.
[9] Avishai Wool,et al. A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks , 2017, CT-RSA.
[10] J. Massey. Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[11] Pantelimon George Popescu,et al. Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools , 2017, CHES.
[12] Cécile Canovas,et al. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..
[13] A. Adam Ding,et al. A Statistical Model for DPA with Novel Algorithmic Confusion Analysis , 2012, CHES.
[14] Adrian Thillard,et al. How to Estimate the Success Rate of Higher-Order Side-Channel Attacks , 2014, IACR Cryptol. ePrint Arch..
[15] Vincent Grosso,et al. Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys , 2018, IACR Cryptol. ePrint Arch..
[16] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..