2021
DOI: 10.1007/978-3-030-81652-0_23
|View full text |Cite
|
Sign up to set email alerts
|

Correlation Power Analysis and Higher-Order Masking Implementation of WAGE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Table 1 summarises the prior art covering surveys and studies on lightweight ciphers' vulnerabilities to power SCA, with references for readers. The study of [20] evaluates and analyses authenticated lightweight cipher WAGE vulnerability to CPA and compares it against LWC second round candidates. [23] focuses on the study of side channel leakage of GIFT-COFB by applying CPA with the Hamming distance model.…”
Section: Related Surveys and Work On Side Channel Attacks Of Lightwei...mentioning
confidence: 99%
See 1 more Smart Citation
“…Table 1 summarises the prior art covering surveys and studies on lightweight ciphers' vulnerabilities to power SCA, with references for readers. The study of [20] evaluates and analyses authenticated lightweight cipher WAGE vulnerability to CPA and compares it against LWC second round candidates. [23] focuses on the study of side channel leakage of GIFT-COFB by applying CPA with the Hamming distance model.…”
Section: Related Surveys and Work On Side Channel Attacks Of Lightwei...mentioning
confidence: 99%
“…The study of [20] evaluates and analyses authenticated lightweight cipher WAGE vulnerability to CPA and compares it against LWC second round candidates. [23] focuses on the study of side channel leakage of GIFT‐COFB by applying CPA with the Hamming distance model.…”
Section: Introductionmentioning
confidence: 99%