ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Side-channel analysis of the modular inversion step in the RSA key generation algorithm
International Journal of Circuit Theory and Applications
◽
10.1002/cta.2283
◽
2016
◽
Vol 45
(2)
◽
pp. 199-213
◽
Cited By ~ 2
Author(s):
Alejandro Cabrera Aldaya
◽
Raudel Cuiman Márquez
◽
Alejandro J. Cabrera Sarmiento
◽
Santiago Sánchez-Solano
Keyword(s):
Side Channel
◽
Key Generation
◽
Generation Algorithm
◽
Side Channel Analysis
◽
Channel Analysis
◽
Modular Inversion
Download Full-text
Related Documents
Cited By
References
Channel state information based key generation vs. side-channel analysis key information leakage
2011 5th International Conference on Network and System Security
◽
10.1109/icnss.2011.6060012
◽
2011
◽
Author(s):
Huiyun Li
◽
Qi Zhang
◽
Hai Yuan
Keyword(s):
Channel State Information
◽
Information Leakage
◽
Side Channel
◽
Key Generation
◽
Channel State
◽
State Information
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security - ASHES '17
◽
10.1145/3139324.3139328
◽
2017
◽
Cited By ~ 7
Author(s):
Lars Tebelmann
◽
Michael Pehl
◽
Georg Sigl
Keyword(s):
Error Correction
◽
Side Channel
◽
Key Generation
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Side channel analysis attacks against channel state information based key generation
2012 International Conference on Systems and Informatics (ICSAI2012)
◽
10.1109/icsai.2012.6223329
◽
2012
◽
Cited By ~ 1
Author(s):
Liying Xiong
◽
Huiyun Li
Keyword(s):
Channel State Information
◽
Side Channel
◽
Key Generation
◽
Channel State
◽
State Information
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Parameters selection and optimization in profiled side channel analysis based on convolutional neural network
2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology (ICCASIT
◽
10.1109/iccasit50869.2020.9368671
◽
2020
◽
Author(s):
Liu Linyun
◽
Chen Kaiyan
◽
Song Shijie
◽
Zhang Yang
◽
Liu Junyan
◽
...
Keyword(s):
Neural Network
◽
Convolutional Neural Network
◽
Side Channel
◽
Side Channel Analysis
◽
Parameters Selection
◽
Channel Analysis
Download Full-text
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis
Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems
◽
10.1145/2491899.2465570
◽
2013
◽
Cited By ~ 5
Author(s):
Carlos Moreno
◽
Sebastian Fischmeister
◽
M. Anwar Hasan
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis
2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)
◽
10.1109/asianhost51057.2020.9358263
◽
2020
◽
Author(s):
Huifeng Zhu
◽
Xiaolong Guo
◽
Yier Jin
◽
Xuan Zhang
Keyword(s):
Network Modeling
◽
Power Delivery
◽
Side Channel
◽
Modeling Framework
◽
Side Channel Analysis
◽
Cross Domain
◽
Power Delivery Network
◽
Channel Analysis
◽
Delivery Network
Download Full-text
You can detect but you cannot hide: Fault Assisted Side Channel Analysis on Protected Software-based Block Ciphers
2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
◽
10.1109/dft50435.2020.9250870
◽
2020
◽
Keyword(s):
Block Ciphers
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Side-channel analysis attacks based on deep learning network
Frontiers of Computer Science
◽
10.1007/s11704-020-0209-4
◽
2021
◽
Vol 16
(2)
◽
Author(s):
Yu Ou
◽
Lang Li
Keyword(s):
Deep Learning
◽
Side Channel
◽
Side Channel Analysis
◽
Learning Network
◽
Channel Analysis
◽
Deep Learning Network
Download Full-text
Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms
Wireless Security and Cryptography
◽
10.1201/9780849387692-15
◽
2017
◽
pp. 229-264
Keyword(s):
Side Channel
◽
Side Channel Analysis
◽
Hardware Implementations
◽
Cryptographic Algorithms
◽
Channel Analysis
Download Full-text
A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis
Lecture Notes in Computer Science - Applied Cryptography and Network Security Workshops
◽
10.1007/978-3-030-61638-0_8
◽
2020
◽
pp. 126-143
Author(s):
Huimin Li
◽
Marina Krček
◽
Guilherme Perin
Keyword(s):
Deep Learning
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close