Algebraic Side-Channel Analysis in the Presence of Errors (original) (raw)
Related papers
Tolerant algebraic side-channel analysis of AES
2012
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
2012
Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis
… on Very Large …, 2007
Improved algebraic side-channel attack on AES
2012
Satisfiability-based Framework for Enabling Side-channelAttacks on Cryptographic Software
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Lecture Notes in Computer Science, 2009
Side-channel attacks based on linear approximations
2009
Combining Algebraic and Side-Channel Cryptanalysis against Block Ciphers
2009
Analysis of the algebraic side channel attack
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks
Lecture Notes in Computer Science, 2014
Algebraic Side Channel Attack on Trivium and Grain Ciphers
IEEE Access
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Proceedings 2021 Network and Distributed System Security Symposium, 2021
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Lecture Notes in Computer Science, 2009
Some Formal Solutions in Side-channel Cryptanalysis - An Introduction
2008
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
2014
Power amount analysis: Another way to understand power traces in side channel attacks
2012 Second International Conference on Digital Information Processing and Communications (ICDIPC), 2012
2016
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
Computing Research Repository - CORR, 2009
On Boolean and Arithmetic Masking against Differential Power Analysis
Lecture Notes in Computer Science, 2000
A Novel Analysis Method for Assessing the Side-Channel Resistance of Cryptosystems
2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Algebraic and side-channel analysis of lightweight block ciphers
2012
2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017
Benoît Chevallier-Mames, Mathieu Ciet
2003
Towards security limits in side-channel attacks
2006
On Practical Second-Order Power Analysis Attacks for Block Ciphers
Lecture Notes in Computer Science, 2010
Algebraic Attacks and Decomposition of Boolean Functions
Lecture Notes in Computer Science, 2004
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher
Applied Sciences
Integration, 2019
International Journal of Advanced Computer Science and Applications, 2021