Item Infomation
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Andreas, Wiemers | - |
dc.contributor.author | Johannes, Mittmann | - |
dc.date.accessioned | 2023-03-31T08:51:03Z | - |
dc.date.available | 2023-03-31T08:51:03Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | https://link.springer.com/article/10.1007/s13389-021-00279-2 | - |
dc.identifier.uri | https://dlib.phenikaa-uni.edu.vn/handle/PNK/7400 | - |
dc.description | CC BY | vi |
dc.description.abstract | Recent publications consider side-channel attacks against the key schedule of the Data Encryption Standard (DES). These publications identify a leakage model depending on the XOR of register values in the DES key schedule. Building on this leakage model, we first revisit a discrete model which assumes that the Hamming distances between subsequent round keys leak without error. We analyze this model formally and provide theoretical explanations for observations made in previous works. Next we examine a continuous model which considers more points of interest and also takes noise into account. | vi |
dc.language.iso | en | vi |
dc.publisher | Springer | vi |
dc.subject | DES | vi |
dc.subject | XOR | vi |
dc.title | Improving recent side-channel attacks against the DES key schedule | vi |
dc.type | Book | vi |
Appears in Collections | ||
OER - Công nghệ thông tin |
Files in This Item: