Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures. | 0 | 0.34 | 2022 |
Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers. | 0 | 0.34 | 2022 |
Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA. | 1 | 0.37 | 2021 |
DL-LA: Deep Learning Leakage Assessment A modern roadmap for SCA evaluations. | 0 | 0.34 | 2021 |
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. | 2 | 0.44 | 2021 |
Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -. | 0 | 0.34 | 2021 |
Unrolled Cryptography on Silicon A Physical Security Analysis. | 0 | 0.34 | 2020 |
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations. | 0 | 0.34 | 2019 |
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed. | 0 | 0.34 | 2018 |
Static Power Side-Channel Analysis - A Survey on Measurement Factors. | 0 | 0.34 | 2018 |