How to reveal the secrets of an obscure white-box implementation
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00207-5
Applications of machine learning techniques in side-channel attacks: a survey
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00212-8
Deep learning for side-channel analysis and introduction to ASCAD database
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00220-8
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00209-3
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00204-8
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-018-00202-2
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00211-9
Polynomial multiplication over binary finite fields: new upper bounds
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00210-w
Side-channel robustness analysis of masked assembly codes using a symbolic approach
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00205-7
Faster modular arithmetic for isogeny-based crypto on embedded devices
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00214-6
Uniform Montgomery multiplier
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00213-7
On the feasibility of deriving cryptographic keys from MEMS sensors
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00208-4
On the verification of system-level information flow properties for virtualized execution platforms
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00216-4
Physical model of sensitive data leakage from PC-based cryptographic systems
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00215-5
Same value analysis on Edwards curves
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00206-6
An automated framework for exploitable fault identification in block ciphers
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00203-9
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00219-1
Efficient and secure software implementations of Fantomas
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00218-2
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00217-3
Improving side-channel attacks against pairing-based cryptography
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-018-00201-3