Item Infomation

Full metadata record
DC FieldValueLanguage
dc.contributor.authorAndreas, Wiemers-
dc.contributor.authorJohannes, Mittmann-
dc.date.accessioned2023-03-31T08:51:03Z-
dc.date.available2023-03-31T08:51:03Z-
dc.date.issued2023-
dc.identifier.urihttps://link.springer.com/article/10.1007/s13389-021-00279-2-
dc.identifier.urihttps://dlib.phenikaa-uni.edu.vn/handle/PNK/7400-
dc.descriptionCC BYvi
dc.description.abstractRecent publications consider side-channel attacks against the key schedule of the Data Encryption Standard (DES). These publications identify a leakage model depending on the XOR of register values in the DES key schedule. Building on this leakage model, we first revisit a discrete model which assumes that the Hamming distances between subsequent round keys leak without error. We analyze this model formally and provide theoretical explanations for observations made in previous works. Next we examine a continuous model which considers more points of interest and also takes noise into account.vi
dc.language.isoenvi
dc.publisherSpringervi
dc.subjectDESvi
dc.subjectXORvi
dc.titleImproving recent side-channel attacks against the DES key schedulevi
dc.typeBookvi
Appears in CollectionsOER - Công nghệ thông tin

Files in This Item: