2018
DOI: 10.1007/978-3-319-78556-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Novel Leakage Against Realistic Masking and Shuffling Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
16
1

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(17 citation statements)
references
References 15 publications
0
16
1
Order By: Relevance
“…We also implemented our method on simulated trace and a well-leaked board in terms of power analysis (the board is used in academic articles because the power source is well-leaked and the platform is easy to use; detailed information can be found at http://wiki.newae.com.). However, in this paper, we show two differences compared to the previous paper [19]. One is that we extend our previously suggested equation, as shown in the present Appendix A.…”
Section: Introductioncontrasting
confidence: 58%
See 4 more Smart Citations
“…We also implemented our method on simulated trace and a well-leaked board in terms of power analysis (the board is used in academic articles because the power source is well-leaked and the platform is easy to use; detailed information can be found at http://wiki.newae.com.). However, in this paper, we show two differences compared to the previous paper [19]. One is that we extend our previously suggested equation, as shown in the present Appendix A.…”
Section: Introductioncontrasting
confidence: 58%
“…That is, novel combinations are found in this paper, differing from the original suggestion [19]. Specifically, novel combinations induce that four bits of eight bits are related to second-order leakage, whereas the original combination suggested in [19] derives only two bits of eight bits.…”
Section: Introductionmentioning
confidence: 76%
See 3 more Smart Citations