Key Enumeration from the Adversarial Viewpoint
暂无分享,去创建一个
Vincent Verneuil | Romain Poussier | François-Xavier Standaert | Melissa Azouaoui | François-Xavier Standaert | R. Poussier | M. Azouaoui | Vincent Verneuil
[1] François-Xavier Standaert,et al. An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..
[2] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[3] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[4] Romain Poussier,et al. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.
[5] Pantelimon George Popescu,et al. Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools , 2017, CHES.
[6] Elisabeth Oswald,et al. Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations , 2016, IACR Cryptol. ePrint Arch..
[7] Andrey Bogdanov,et al. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks , 2015, SAC.
[8] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[9] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[10] Romain Poussier,et al. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.
[11] Tanja Lange,et al. Tighter, faster, simpler side-channel security evaluations beyond computing power , 2015, IACR Cryptol. ePrint Arch..
[12] Thomas Eisenbarth,et al. Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery , 2014, CARDIS.
[13] François-Xavier Standaert,et al. Security Evaluations beyond Computing Power , 2013, EUROCRYPT.
[14] Elisabeth Oswald,et al. Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.
[15] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.