Cryptology ePrint Archive: Report 2013/608
Available versions in chronological order
20130923:033901 (posted 23-Sep-2013 03:39:01 UTC)
How to Further Increase Leakage Exploitation Rate in Profiled Side-Channel Attacks?
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131010:025524 (posted 10-Oct-2013 02:55:24 UTC)
Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131202:012359 (posted 02-Dec-2013 01:23:59 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131204:093540 (posted 04-Dec-2013 09:35:40 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131204:093717 (posted 04-Dec-2013 09:37:17 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131207:045038 (posted 07-Dec-2013 04:50:38 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131207:045305 (posted 07-Dec-2013 04:53:05 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131209:015005 (posted 09-Dec-2013 01:50:05 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20131209:021546 (posted 09-Dec-2013 02:15:46 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140225:013024 (posted 25-Feb-2014 01:30:24 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140313:063824 (posted 13-Mar-2014 06:38:24 UTC)
Towards Leakage Exploitation Rate Optimality in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140419:131441 (posted 19-Apr-2014 13:14:41 UTC)
Towards Optimal Leakage Exploitation Rate in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140428:082902 (posted 28-Apr-2014 08:29:02 UTC)
Towards Optimal Leakage Exploitation Rate in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140429:023502 (posted 29-Apr-2014 02:35:02 UTC)
Towards Optimal Leakage Exploitation Rate in Template Attack
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140429:060635 (posted 29-Apr-2014 06:06:35 UTC)
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140430:081109 (posted 30-Apr-2014 08:11:09 UTC)
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140703:023724 (posted 03-Jul-2014 02:37:24 UTC)
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
20140801:071155 (posted 01-Aug-2014 07:11:55 UTC)
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
[
Cryptology ePrint archive
]