Linked e-resources
Details
Table of Contents
Side-Channel Attacks
Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
Two Operands of Multipliers in Side-Channel Attack
FPGA Countermeasures
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware
Timing Attacks and Countermeasures
A Faster and More Realistic Flush+Reload Attack on AES
Faster software for fast endomorphisms
Toward Secure Implementation of McEliece Decryption
Fault Attacks
Fault Injection with a new favor: Memetic Algorithms make a difference
Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers
A Biased Fault Attack on the Time Redundancy Countermeasure for AES
Countermeasures
Faster Mask Conversion with Lookup Tables
Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC
Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.
Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
Two Operands of Multipliers in Side-Channel Attack
FPGA Countermeasures
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware
Timing Attacks and Countermeasures
A Faster and More Realistic Flush+Reload Attack on AES
Faster software for fast endomorphisms
Toward Secure Implementation of McEliece Decryption
Fault Attacks
Fault Injection with a new favor: Memetic Algorithms make a difference
Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers
A Biased Fault Attack on the Time Redundancy Countermeasure for AES
Countermeasures
Faster Mask Conversion with Lookup Tables
Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC
Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.