Author:
Lashermes Ronan,Le Bouder Hélène
Publisher
Springer Science and Business Media LLC
Reference17 articles.
1. Bursztein, E., Invernizzi, L., Král, K., Moghimi, D., Picod, J.M., Zhang, M.: Generic attacks against cryptographic hardware through long-range deep learning. arXiv preprint arXiv:2306.07249 (2023)
2. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M.J. (Ed.) Advances in Cryptology—CRYPTO’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15–19, 1999, Proceedings. Lecture Notes in Computer Science, vol. 1666, pp. 398–412. Springer, Berlin (1999). https://doi.org/10.1007/3-540-48405-1_26,
3. Clavier, C.: An improved SCARE cryptanalysis against a secret A3/A8 GSM algorithm. In: McDaniel, P.D., Gupta, S.K. (Eds.) Third International Conference on Information Systems Security (ICISS). vol. 4812, pp. 143–155. Springer, Berlin (2007)
4. Clavier, C., Isorez, Q., Marion, D., Wurcker, A.: Complete reverse-engineering of aes-like block ciphers by SCARE and FIRE attacks. Cryptogr. Commun. 7(1), 121–162 (2015)
5. Clavier, C., Reynaud, L.: Improved blind side-channel analysis by exploitation of joint distributions of leakages. In: Fischer, W., Homma, N., (eds.) Cryptographic Hardware and Embedded Systems—CHES. vol. 10529, pp. 24–44. Springer, Berlin (2017)