Key schedule against template attack-based simple power analysis on a single target
Since 2002, there have been active discussions on template attacks due to the robust performance of such attacks. There are reports of numerous proposals to improve the accuracy of prediction model in order to identify the point of interest. To date, many researchers have only focused on the perform...
Saved in:
Main Authors: | Won, Yoo-Seung, Sim, Bo-Yeon, Park, Jong-Yeon |
---|---|
Other Authors: | PACE Temasek Laboratories |
Format: | Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/146189 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
(Strong) multidesignated verifiers signatures secure against rogue key attack
by: ZHANG, Yunmei, et al.
Published: (2012) -
Practical cold boot attack on IoT device - Case study on Raspberry Pi -
by: Won, Yoo-Seung, et al.
Published: (2021) -
A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
by: Won, Yoo-Seung, et al.
Published: (2021) -
Secured asynchronous-logic cryptography circuits to countermeasure against side-channel attack
by: Ng, Jun Sheng
Published: (2024) -
Post-quantum attacks against symmetric-key cryptography systems
by: Pham, Thi Minh Phuong
Published: (2024)