Side Channels - 2


Posted on in Presentations

Methodologies for performing side channel attacks are discussed. Topic 1: Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited Authors: Daniel P. Martin; Luke Mather; Elisabeth Oswald Topic 2: High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction Authors: Florian Unterstein; Johann Heyszl; Fabrizio De Santis; Robert Specht; Georg Sigl

Participants
Dr. Luke Mather

Research Associate, University of Bristol

Florian Unterstein

Research Assistant, Fraunhofer AISEC

Protecting Data & Applied Crypto

cryptography


Topic

Subtopic


Share With Your Community