Comparing Key Rank Estimation Methods

[1]  Avishai Wool,et al.  Rank estimation with bounded error via exponential sampling , 2021, Journal of Cryptographic Engineering.

[2]  A. Adam Ding,et al.  A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[3]  Avishai Wool,et al.  Fast Analytical Rank Estimation , 2019, COSADE.

[4]  Avishai Wool,et al.  Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling , 2019, IACR Cryptol. ePrint Arch..

[5]  Vincent Grosso,et al.  Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys , 2018, IACR Cryptol. ePrint Arch..

[6]  Elisabeth Oswald,et al.  Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited , 2018, IACR Cryptol. ePrint Arch..

[7]  Pantelimon George Popescu,et al.  Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools , 2017, CHES.

[8]  Elisabeth Oswald,et al.  Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations , 2016, IACR Cryptol. ePrint Arch..

[9]  Romain Poussier,et al.  Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.

[10]  Elisabeth Oswald,et al.  Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.

[11]  Romain Poussier,et al.  Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations , 2015, CARDIS.

[12]  A. Ding,et al.  A statistics-based success rate model for DPA and CPA , 2015, Journal of Cryptographic Engineering.

[13]  Romain Poussier,et al.  Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.

[14]  Adrian Thillard,et al.  How to Estimate the Success Rate of Higher-Order Side-Channel Attacks , 2014, IACR Cryptol. ePrint Arch..

[15]  François-Xavier Standaert,et al.  Security Evaluations beyond Computing Power , 2013, EUROCRYPT.

[16]  A. Adam Ding,et al.  A Statistical Model for DPA with Novel Algorithmic Confusion Analysis , 2012, CHES.

[17]  François-Xavier Standaert,et al.  An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..

[18]  Matthieu Rivain,et al.  On the Exact Success Rate of Side Channel Analysis in the Gaussian Model , 2009, Selected Areas in Cryptography.

[19]  Benjamin Sach,et al.  How low can you go? Using side-channel data to enhance brute-force key recovery , 2016, IACR Cryptol. ePrint Arch..

[20]  Tanja Lange,et al.  Tighter, faster, simpler side-channel security evaluations beyond computing power , 2015, IACR Cryptol. ePrint Arch..