Group Collision Attack.

IEEE Transactions on Information Forensics and Security(2019)

引用 11|浏览35
暂无评分
摘要
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search. However, the application of them is limited by very large key candidate space and computing power consumption. For example, the attacker may spend several weeks o...
更多
查看译文
关键词
Correlation,Side-channel attacks,Tools,Power demand,Memory management,Fault tolerance
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要