Brute-Force Search Strategies for Single-Trace and Few - Traces Template Attacks on the DES Round Keys of a Recent Smart Card.
Mathias WagnerStefan HeysePublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- search strategies
- brute force
- smart card
- java card
- secret key
- differential power analysis
- security mechanisms
- search strategy
- remote user authentication scheme
- block cipher
- power analysis
- search algorithm
- heuristic search
- security requirements
- retrieval effectiveness
- search methods
- authentication protocol
- exhaustive search
- constraint programming
- authentication scheme
- computationally expensive
- evolutionary algorithm
- branch and bound
- security analysis
- information security
- constraint satisfaction
- password guessing
- genetic algorithm
- digital signature
- keywords