Back to Results
First PageMeta Content
Coding theory / Advanced Encryption Standard / Side channel attack / Block cipher / Ciphertext / Known-plaintext attack / Hamming weight / Cryptanalysis / Cube attack / Cryptography / Espionage / Cyberwarfare


Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song1,2 , Lei Hu1,2 , Siwei Sun1,2 , Zhang Zhang2 ,Danping Shi1,2 , Ronglin Hao1,3 1 State Key Laboratory of Information Security,
Add to Reading List

Document Date: 2014-09-01 04:34:57


Open Document

File Size: 160,66 KB

Share Result on Facebook

Company

AMD / Intel / the AES / State Key Laboratory / /

/

Facility

Institute of Information Engineering / State Key Laboratory of Information Security / University of Science / /

IndustryTerm

target solution / substitution-permutation network / target device / schedule algorithm / wrong solutions / /

Organization

Chinese Academy of Sciences / Department of Electronic Engineering and Information / University of Science and Technology of China / Hefei / US Federal Reserve / Institute of Information Engineering / /

Person

Suresh Chari / Ben-Gurion Equi / /

Position

Hamming weight leakage model / cold boot attacks and cube attacks / /

ProvinceOrState

Bivium / /

Technology

encryption / block cipher / Xeon E5420 processor / decoding algorithm / key schedule algorithm / secret key / 3600+ processor / Technology of China / Linux / /

SocialTag