Side-Channel Information Leakage of Code-Based Masked Implementations | 0 | 0.34 | 2022 |
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations. | 0 | 0.34 | 2022 |
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. | 0 | 0.34 | 2022 |
Variations on a Theme by Massey | 0 | 0.34 | 2022 |
Side-Channel Expectation-Maximization Attacks. | 0 | 0.34 | 2022 |
Bent Sequences Over Hadamard Codes For Physically Unclonable Functions | 0 | 0.34 | 2021 |
On Conditional Alpha-Information and its Application to Side-Channel Analysis. | 0 | 0.34 | 2021 |
The Big Picture of Delay-PUF Dependability | 0 | 0.34 | 2020 |
Rényi Entropy Power and Normal Transport | 0 | 0.34 | 2020 |
Persistent Fault Analysis with Few Encryptions | 0 | 0.34 | 2020 |
Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem | 0 | 0.34 | 2020 |
How Relevant is Hick's Law for HCI? | 0 | 0.34 | 2020 |
A Feedback Information-Theoretic Transmission Scheme (Fitts) For Modeling Trajectory Variability In Aimed Movements | 2 | 0.36 | 2020 |
Asymptotic Normality of Q-Ary Linear Codes. | 0 | 0.34 | 2019 |
Regression To A Linear Lower Bound With Outliers: An Exponentially Modified Gaussian Noise Model | 0 | 0.34 | 2019 |
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis. | 0 | 0.34 | 2019 |
Transportation Proofs of Rényi Entropy Power Inequalities. | 0 | 0.34 | 2019 |
An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware | 1 | 0.35 | 2019 |
Best Information is Most Successful | 0 | 0.34 | 2019 |
Entropy Estimation of Physically Unclonable Functions via Chow Parameters | 0 | 0.34 | 2019 |
An Improved Analysis of Reliability and Entropy for Delay PUFs | 2 | 0.40 | 2018 |
Uniformly Projected RCQD QAM: A Low-Complexity Signal Space Diversity Solution Over Fading Channels With or Without Erasures. | 0 | 0.34 | 2018 |
Confused yet Successful - - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR. | 0 | 0.34 | 2018 |
The Perils of Confounding Factors: How Fitts' Law Experiments can Lead to False Conclusions | 4 | 0.38 | 2018 |
Rényi Entropy Power Inequalities via Normal Transport and Rotation. | 0 | 0.34 | 2018 |
Information-Theoretic Analysis Of The Speed-Accuracy Tradeoff With Feedback | 0 | 0.34 | 2018 |
Speed-Accuracy Tradeoff: A Formal Information-Theoretic Transmission Scheme (FITTS). | 1 | 0.34 | 2018 |
On the optimality and practicability of mutual information analysis in some scenarios | 0 | 0.34 | 2018 |
BIGFile: Bayesian Information Gain for Fast File Retrieval. | 3 | 0.38 | 2018 |
A Feedback Information-Theoretic Transmission Scheme (FITTS) for Modelling Aimed Movements. | 0 | 0.34 | 2018 |
Optimal Transport to the Entropy-Power Inequality and a Reverse Inequality. | 1 | 0.37 | 2017 |
Stochastic Collision Attack. | 0 | 0.34 | 2017 |
BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation. | 4 | 0.38 | 2017 |
Yet Another Proof of the Entropy Power Inequality. | 0 | 0.34 | 2017 |
Optimal Transport To Renyi Entropies | 0 | 0.34 | 2017 |
Codes For Side-Channel Attacks And Protections | 1 | 0.35 | 2017 |
To Miss is Human: Information-Theoretic Rationale for Target Misses in Fitts' Law. | 1 | 0.36 | 2017 |
At Every Corner: Determining Corner Points Of Two-User Gaussian Interference Channels | 1 | 0.37 | 2017 |
Optimal side-channel attacks for multivariate leakages and multiple models. | 4 | 0.48 | 2017 |
Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks. | 0 | 0.34 | 2016 |
Less is More - Dimensionality Reduction from a Theoretical Perspective. | 5 | 0.43 | 2016 |
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. | 0 | 0.34 | 2016 |
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. | 0 | 0.34 | 2016 |
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. | 1 | 0.35 | 2016 |
A Key to Success - Success Exponents for Side-Channel Distinguishers. | 0 | 0.34 | 2016 |
Almost there corner points of Gaussian interference channels | 2 | 0.39 | 2015 |
Masks Will Fall Off - Higher-Order Optimal Distinguishers. | 0 | 0.34 | 2015 |
Glass Plus Skin: An Empirical Evaluation Of The Added Value Of Finger Identification To Basic Single-Touch Interaction On Touch Screens | 7 | 0.45 | 2015 |
A mathematical description of the speed/accuracy trade-off of aimed movement | 7 | 0.73 | 2015 |
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. | 1 | 0.35 | 2014 |