Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks.
Alkistis Aikaterini SigourouIevgen KabinPeter LangendörferNicolas SklavosZoya DykaPublished in: MECO (2023)
Keyphrases
- experimental evaluation
- simulated annealing
- preprocessing
- cost function
- dynamic programming
- objective function
- matching algorithm
- detection algorithm
- optimization algorithm
- np hard
- k means
- worst case
- computational complexity
- particle swarm optimization
- segmentation algorithm
- learning algorithm
- recognition algorithm
- hardware implementation
- search space
- high accuracy
- data structure
- optimal solution
- tree structure