2008
DOI: 10.1007/978-3-540-89754-5_20
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
31
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(31 citation statements)
references
References 5 publications
0
31
0
Order By: Relevance
“…Figures (5,6,7,8) illustrate the spreading of the obtained Pearson's coefficient around the mean value. This variance gives us information about the amount of trust we can put into the mean values.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Figures (5,6,7,8) illustrate the spreading of the obtained Pearson's coefficient around the mean value. This variance gives us information about the amount of trust we can put into the mean values.…”
Section: Methodsmentioning
confidence: 99%
“…In Figs. (5,6,7,8), we plot estimations of the mean and variance ofρ 0,t (τ ) andρ 1,t (τ ) for several pairs (τ, t). Clearly, the efficiency of the attack described in Sect.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In fact, the most noticeable exceptions attempting to better exploit computational power in physical attacks are based on advanced techniques, e.g. exploiting the detection of collisions [5,18,31,32], or taking advantage of algebraic cryptanalysis [6,23,27,28], of which the practical relevance remains an open question (because of stronger assumptions). But as again suggested by previous works in statistical cryptanalysis, optimal key ranking procedures would be a more direct approach in order to better trade data and time complexities in "standard" side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%