From post

An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected AES -.

, , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 174-186. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key Bit-Dependent Attack on Protected PKC Using a Single Trace., и . ISPEC, том 10701 из Lecture Notes in Computer Science, стр. 168-185. Springer, (2017)An improved side channel attack using event information of subtraction., , , и . J. Netw. Comput. Appl., (2014)A Study on the SCA Trends for Application to IoT Devices., и . J. Internet Serv. Inf. Secur., 10 (1): 2-21 (2020)Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm., , , , и . J. Commun. Networks, 11 (6): 556-563 (2009)Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack., и . IACR Cryptology ePrint Archive, (2019)A new bit-serial multiplier over GF(pm) using irreducible trinomials., , , , и . Comput. Math. Appl., 60 (2): 355-361 (2010)Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation., , и . IEEE Access, (2022)Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT., , , и . ICCST, стр. 1-5. IEEE, (2011)Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction., , и . IACR Cryptol. ePrint Arch., (2021)Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure., , , , и . ICISC (1), том 14561 из Lecture Notes in Computer Science, стр. 185-201. Springer, (2023)