Side-channel cryptographic attacks using pseudo-boolean optimization.
Yossef OrenAvishai WoolPublished in: Constraints An Int. J. (2016)
Keyphrases
- pseudo boolean optimization
- differential power analysis
- power analysis
- countermeasures
- smart card
- security protocols
- lower bound
- constraint satisfaction problems
- security mechanisms
- information security
- cryptographic protocols
- stream cipher
- cryptographic algorithms
- secret key
- malicious attacks
- advanced encryption standard
- digital signature
- traffic analysis
- denial of service attacks
- hash functions
- elliptic curve
- authentication protocol
- block cipher
- malicious users
- security analysis