Side Channels - 2

Posted on in Presentations

Methodologies for performing side channel attacks are discussed. Topic 1: Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited Authors: Daniel P. Martin; Luke Mather; Elisabeth Oswald Topic 2: High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction Authors: Florian Unterstein; Johann Heyszl; Fabrizio De Santis; Robert Specht; Georg Sigl

Dr. Luke Mather

Research Associate, University of Bristol

Florian Unterstein

Research Assistant, Fraunhofer AISEC

Protecting Data & Applied Crypto




Share With Your Community