Sciweavers

264 search results - page 3 / 53
» Algebraic Side-Channel Attacks
Sort
View
71
Voted
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
15 years 2 months ago
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack
Kai Schramm, Gregor Leander, Patrick Felke, Christ...
79
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 3 months ago
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
Abstract. A number of papers on side-channel attacks have been published where the side-channel information was not exploited in an optimal manner, which reduced their efficiency. ...
Werner Schindler
74
Voted
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
15 years 3 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
64
Voted
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
15 years 3 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
99
Voted
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...