Comparing Key Rank Estimation Methods
暂无分享,去创建一个
[1] Avishai Wool,et al. Rank estimation with bounded error via exponential sampling , 2021, Journal of Cryptographic Engineering.
[2] A. Adam Ding,et al. A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[3] Avishai Wool,et al. Fast Analytical Rank Estimation , 2019, COSADE.
[4] Avishai Wool,et al. Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling , 2019, IACR Cryptol. ePrint Arch..
[5] Vincent Grosso,et al. Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys , 2018, IACR Cryptol. ePrint Arch..
[6] Elisabeth Oswald,et al. Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited , 2018, IACR Cryptol. ePrint Arch..
[7] Pantelimon George Popescu,et al. Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools , 2017, CHES.
[8] Elisabeth Oswald,et al. Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations , 2016, IACR Cryptol. ePrint Arch..
[9] Romain Poussier,et al. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.
[10] Elisabeth Oswald,et al. Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.
[11] Romain Poussier,et al. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations , 2015, CARDIS.
[12] A. Ding,et al. A statistics-based success rate model for DPA and CPA , 2015, Journal of Cryptographic Engineering.
[13] Romain Poussier,et al. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.
[14] Adrian Thillard,et al. How to Estimate the Success Rate of Higher-Order Side-Channel Attacks , 2014, IACR Cryptol. ePrint Arch..
[15] François-Xavier Standaert,et al. Security Evaluations beyond Computing Power , 2013, EUROCRYPT.
[16] A. Adam Ding,et al. A Statistical Model for DPA with Novel Algorithmic Confusion Analysis , 2012, CHES.
[17] François-Xavier Standaert,et al. An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..
[18] Matthieu Rivain,et al. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.
[19] Benjamin Sach,et al. How low can you go? Using side-channel data to enhance brute-force key recovery , 2016, IACR Cryptol. ePrint Arch..
[20] Tanja Lange,et al. Tighter, faster, simpler side-channel security evaluations beyond computing power , 2015, IACR Cryptol. ePrint Arch..