Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography.
Tolun TosunErkay SavasPublished in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
- countermeasures
- information security
- power analysis
- secret key
- cellular automata
- missing values
- efficient implementation
- information filtering
- malicious attacks
- smart card
- filtering algorithm
- key exchange protocol
- filtering process
- security requirements
- network security
- uncertain information
- adaptive filtering
- association rules
- detection mechanism
- image processing
- information systems
- attack detection
- data mining