A new key rank estimation method to investigate dependent key lists of side channel attacks
暂无分享,去创建一个
Yang Li | Jian Wang | Shuang Wang | Jian Wang | Shuang Wang | Yang Li
[1] Tanja Lange,et al. Tighter, faster, simpler side-channel security evaluations beyond computing power , 2015, IACR Cryptol. ePrint Arch..
[2] Romain Poussier,et al. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.
[3] Andrey Bogdanov,et al. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks , 2015, SAC.
[4] Avishai Wool,et al. A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks , 2017, CT-RSA.
[5] Amir Moradi,et al. Side-Channel Leakage through Static Power - Should We Care about in Practice? , 2014, CHES.
[6] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[7] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[8] François-Xavier Standaert,et al. Security Evaluations beyond Computing Power , 2013, EUROCRYPT.
[9] François-Xavier Standaert,et al. An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..
[10] Thomas Eisenbarth,et al. Correlation-Enhanced Power Analysis Collision Attack , 2010, CHES.
[11] Elisabeth Oswald,et al. Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.
[12] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[13] Yang Li,et al. On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting , 2011, CHES.
[14] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[15] Christof Paar,et al. Large laser spots and fault sensitivity analysis , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[16] Jerry den Hartog,et al. Improving DPA by Peak Distribution Analysis , 2010, Selected Areas in Cryptography.
[17] Christof Paar,et al. A New Class of Collision Attacks and Its Application to DES , 2003, FSE.
[18] Thomas Roche,et al. Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices , 2013, COSADE.
[19] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.