Author of the publication

An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected AES -.

, , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 174-186. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack., and . IACR Cryptology ePrint Archive, (2019)An improved side channel attack using event information of subtraction., , , and . J. Netw. Comput. Appl., (2014)A Study on the SCA Trends for Application to IoT Devices., and . J. Internet Serv. Inf. Secur., 10 (1): 2-21 (2020)Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm., , , , and . J. Commun. Networks, 11 (6): 556-563 (2009)Key Bit-Dependent Attack on Protected PKC Using a Single Trace., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)A new bit-serial multiplier over GF(pm) using irreducible trinomials., , , , and . Comput. Math. Appl., 60 (2): 355-361 (2010)Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation., , and . IEEE Access, (2022)Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction., , and . IACR Cryptol. ePrint Arch., (2021)Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT., , , and . ICCST, page 1-5. IEEE, (2011)Differential Fault Attack on Lightweight Block Cipher PIPO., , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 296-307. Springer, (2021)