Transparency Order of (n, m)-Functions-Its Further Characterization and Applications | 0 | 0.34 | 2021 |
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks | 0 | 0.34 | 2021 |
Theoretical Estimation on the Success Rate of the Asymptotic Higher Order Optimal Distinguisher | 0 | 0.34 | 2021 |
Multi-channel time-frequency fusion attacks. | 0 | 0.34 | 2021 |
Side-Channel Leakage Detection Based on Constant Parameter Channel Model | 0 | 0.34 | 2020 |
On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters. | 1 | 0.35 | 2020 |
Template attack vs. stochastic model: An empirical study on the performances of profiling attacks in real scenarios. | 0 | 0.34 | 2019 |
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages | 1 | 0.39 | 2018 |
Multiple leakage samples based higher order optimal distinguisher. | 0 | 0.34 | 2018 |
On the exact relationship between the Mutual Information Metric and the Success Rate Metric. | 1 | 0.37 | 2018 |
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC | 0 | 0.34 | 2017 |
How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. | 0 | 0.34 | 2017 |
Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher. | 0 | 0.34 | 2017 |
Multi-Channel Fusion Attacks. | 1 | 0.38 | 2017 |
Theoretical and practical aspects of multiple samples correlation power analysis. | 0 | 0.34 | 2016 |
Towards optimal leakage exploitation rate in template attacks. | 0 | 0.34 | 2016 |
Higher-Order Masking Schemes for Simon. | 0 | 0.34 | 2015 |
How To Compare Selections Of Points Of Interest For Side-Channel Distinguishers In Practice? | 2 | 0.39 | 2014 |
How to Choose Interesting Points for Template Attack More Effectively? | 1 | 0.37 | 2014 |
How to Choose Interesting Points for Template Attacks? | 0 | 0.34 | 2014 |
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers. | 4 | 0.45 | 2013 |
Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks. | 0 | 0.34 | 2013 |