Posted on
in Presentations
Methodologies for performing side channel attacks are discussed.
Topic 1: Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited
Authors: Daniel P. Martin; Luke Mather; Elisabeth Oswald
Topic 2: High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
Authors: Florian Unterstein; Johann Heyszl; Fabrizio De Santis; Robert Specht; Georg Sigl
Share With Your Community