Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
20
views
14
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,783
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Pattern Recognition and Machine Intelligence
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited
other
Author(s):
Daniel P. Martin
,
Luke Mather
,
Elisabeth Oswald
Publication date
(Online):
March 07 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electron Channelling Contrast Imaging (ECCI)
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Power Analysis
Paul Köcher
,
Joshua Jaffe
,
Benjamin Jun
(1999)
0
comments
Cited
144
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
One for all – all for one: unifying standard differential power analysis attacks
S. Mangard
,
E. Oswald
,
F.-X. Standaert
(2011)
0
comments
Cited
25
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
Nicolas Veyrat-Charvillon
,
Benoît Gérard
,
Mathieu Renauld
…
(2013)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
All references
Author and book information
Contributors
Daniel P. Martin:
(View ORCID Profile)
Luke Mather:
(View ORCID Profile)
Elisabeth Oswald:
(View ORCID Profile)
Book Chapter
Publication date (Print):
2018
Publication date (Online):
March 07 2018
Pages
: 394-412
DOI:
10.1007/978-3-319-76953-0_21
SO-VID:
d835e0ee-d38a-4cd9-988e-c880f8825412
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Key-Private Proxy Re-encryption under LWE
pp. 1
What object-oriented programming may be - and what it does not have to be
pp. 3
Modeling of Digital Twin Workshop Based on Perception Data
pp. 29
Uncertainty Estimation for Black-Box Classification Models: A Use Case for Sentiment Analysis
pp. 42
Measuring and Comparing Scalability of Agent-Based Simulation Frameworks
pp. 34
Using Serious Games for Cognitive Disabilities
pp. 58
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
pp. 70
PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure
pp. 51
HealthQA: A Chinese QA Summary System for Smart Health
pp. 52
Computing Emotion Awareness Through Facial Electromyography
pp. 62
A Variant of NTRU with Non-invertible Polynomials
pp. 63
Designing BENECA m-Health APP, A Mobile Health Application to Monitor Diet and Physical Activity in Cancer Survivors
pp. 65
Distributed Simulation Environment of Unmanned Aerial Systems for a Search Problem
pp. 93
Name Collision in Multiple Classification Hierarchies
pp. 55
Time Series Prediction Based on Gene Expression Programming
pp. 87
Effectiveness of Virtual Reality Survival Horror Games for the Emotional Elicitation: Preliminary Insights Using Resident Evil 7: Biohazard
pp. 89
Using Twine as a Therapeutic Writing Tool for Creating Serious Games
pp. 99
Link Prediction Approaches for Disease Networks
pp. 60
Geometric Decision Rules for Instance-Based Learning Problems
pp. 92
Securing Data Provenance in Internet of Things (IoT) Systems
pp. 109
Multi-spectral False Color Shadow Detection
pp. 122
Nice drawings for planar bipartite graphs
pp. 149
Attitudes Towards Aging and the Acceptance of ICT for Aging in Place
pp. 163
A Comparison Between Representations for Evolving Images
pp. 218
Integrating Biocybernetic Adaptation in Virtual Reality Training Concentration and Calmness in Target Shooting
pp. 114
Results of an Adaboost Approach on Alzheimer’s Disease Detection on MRI
pp. 171
Feature Ranking for Multi-target Regression with Tree Ensemble Methods
pp. 313
Counting Keys in Parallel After a Side Channel Attack
pp. 171
Efficiently Enumerating All Connected Induced Subgraphs of a Large Molecular Network
pp. 197
Multi-layer Access Control for SDN-Based Telco Clouds
pp. 151
The Common Lisp Object System: An Overview
pp. 234
Survey on Autonomous Surface Vessels: Part II - Categorization of 60 Prototypes and Future Applications
pp. 131
The Effective Calcium/Calmodulin Concentration Determines the Sensitivity of CaMKII to the Frequency of Calcium Oscillations
pp. 191
Classification of ECG Arrhythmia Using CNN, SVM and LDA
pp. 193
Reliable Fault Diagnosis of Bearings Using Distance and Density Similarity on an Enhanced k-NN
pp. 151
A Sleep Monitoring Application for u-lifecare Using Accelerometer Sensor of Smartphone
pp. 204
What Affects Patients’ Online Decisions: An Empirical Study of Online Appointment Service Based on Text Mining
pp. 144
Narrative Generation for Suspense: Modeling and Evaluation
pp. 248
DEBC Detection with Deep Learning
pp. 394
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited
pp. 230
Navigation Queries from Triangular Meshes
pp. 294
Genetic Programming and Simulated Annealing: A Hybrid Method to Evolve Decision Trees
pp. 243
Connected Set Cover Problem and Its Applications
pp. 188
Linear Penalization Support Vector Machines for Feature Selection
pp. 332
Training in VR: A Preliminary Study on Learning Assembly/Disassembly Sequences
pp. 384
Open Data Science to Fight COVID-19: Winning the 500k XPRIZE Pandemic Response Challenge
pp. 221
Age and Computer Self-Efficacy in the Use of Digital Technologies: An Investigation of Prototypes for Public Self-Service Terminals
pp. 313
Integration of CNN into a Robotic Architecture to Build Semantic Maps of Indoor Environments
pp. 361
LoT-RBAC: A Location and Time-Based RBAC Model
pp. 213
Adaptive Comprehensive Learning Particle Swarm Optimizer with History Learning
pp. 351
Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency
pp. 251
Human Gait Recognition Based on Signals from Two Force Plates
pp. 338
Leap-Motion Based Online Interactive System for Hand Rehabilitation
pp. 371
Optimal Blurred Segments Decomposition in Linear Time
pp. 332
Context-Awareness in a Persistent Hospital Companion Agent
pp. 285
CW-PRED: A HMM-Based Method for the Classification of Cell Wall-Anchored Proteins of Gram-Positive Bacteria
pp. 394
The Benefits of Haptic Feedback in Telesurgery and Other Teleoperation Systems: A Meta-Analysis
pp. 619
Designing the Empathetic Research IoT Network (ERIN) Chatbot for Mental Health Resources
pp. 377
A PSO-Based Classification Rule Mining Algorithm
pp. 674
Temporal PageRank
pp. 424
Phonation and Articulation Analyses in Laryngeal Pathologies, Cleft Lip and Palate, and Parkinson’s Disease
pp. 458
EEG-Based Subjects Identification Based on Biometrics of Imagined Speech Using EMD
pp. 487
Feature Extraction and Selection in Tool Condition Monitoring System
pp. 598
Effects of E-Games on the Development of Saudi Children with Attention Deficit Hyperactivity Disorder Cognitively, Behaviourally and Socially: An Experimental Study
pp. 569
Online Background-Subtraction with Motion Compensation for Freely Moving Camera
pp. 701
Graph-Based Methods for Clustering Topics of Interest in Twitter
pp. 764
Meta Transfer Learning for Adaptive Vehicle Tracking in UAV Videos
Similar content
3,783
Somites, spinal Ganglia, and centra. Enumeration and interrelationships in staged human embryos, and implications for neural tube defects.
Authors:
R O'Rahilly
,
F Muller
Enumeration of virus particles in aquatic or sediment samples by epifluorescence microscopy
Authors:
CA Suttle
,
JA Fuhrman
Single Versus Dual Platform Analysis for Hematopoietic Stem Cell Enumeration Using ISHAGE Protocol
Authors:
Rahul Naithani
,
Nitin Dayal
,
Gaurav Dixit
See all similar
Cited by
2
A Systematic Appraisal of Side Channel Evaluation Strategies
Authors:
Melissa Azouaoui
,
Davide Bellizia
,
Ileana Buhan
…
A Comprehensive Study of the Key Enumeration Problem
Authors:
Ricardo Villanueva-Polanco
See all cited by