IACR Transactions on Cryptographic Hardware and Embedded Systems 2020
DOI: 10.13154/tches.v2020.i3.22-72
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Profiled Side-Channel Attacks Against the DES Key Schedule

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Such information reveals important details about the internal state of the computer device, such as instructions executed, data processed, states of registers, etc. Previously, side channel information has been widely utilised to extract cryptographic keys from algorithms such as AES [25][26][27] , DES [28,29] and RSA [30] . However, there have also been attempts to use the side channel information of a computer device to reverse engineer embedded applications [31] , verify embedded application runtime integrity [32,33] , identify a device [34] , detect malware [35,36] , etc.…”
Section: Side Channel Analysismentioning
confidence: 99%
“…Such information reveals important details about the internal state of the computer device, such as instructions executed, data processed, states of registers, etc. Previously, side channel information has been widely utilised to extract cryptographic keys from algorithms such as AES [25][26][27] , DES [28,29] and RSA [30] . However, there have also been attempts to use the side channel information of a computer device to reverse engineer embedded applications [31] , verify embedded application runtime integrity [32,33] , identify a device [34] , detect malware [35,36] , etc.…”
Section: Side Channel Analysismentioning
confidence: 99%