Posted on
in Presentations
Methodologies for performing side channel attacks are discussed.
Topic 1: Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited
Authors: Daniel P. Martin; Luke Mather; Elisabeth Oswald
Topic 2: High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
Authors: Florian Unterstein; Johann Heyszl; Fabrizio De Santis; Robert Specht; Georg Sigl
Access this and other Conference presentations with your free RSAC™ Membership. Your Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with peers and experts, and more.
Share With Your Community