On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems

Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger. On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. In Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga, editors, Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings. Volume 7322 of Lecture Notes in Computer Science, pages 169-178, Springer, 2012. [doi]

Authors

Youssef Souissi

This author has not been identified. Look up 'Youssef Souissi' in Google

Nicolas Debande

This author has not been identified. Look up 'Nicolas Debande' in Google

Sami Mekki

This author has not been identified. Look up 'Sami Mekki' in Google

Sylvain Guilley

This author has not been identified. Look up 'Sylvain Guilley' in Google

Ali Maalaoui

This author has not been identified. Look up 'Ali Maalaoui' in Google

Jean-Luc Danger

This author has not been identified. Look up 'Jean-Luc Danger' in Google