Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
24
views
21
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,461
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
other
Author(s):
Cezary Glowacz
,
Vincent Grosso
,
Romain Poussier
,
Joachim Schüth
,
François-Xavier Standaert
Publication date
(Online):
August 12 2015
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genomic Prediction: Relatedness Matrix Estimation
Most cited references
21
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Power Analysis
Paul Köcher
,
Joshua Jaffe
,
Benjamin Jun
(1999)
0
comments
Cited
144
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Template Attacks
Suresh T. Chari
,
Josyula Rao
,
Pankaj Rohatgi
(2003)
0
comments
Cited
96
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
François-Xavier Standaert
,
Tal G. Malkin
,
Moti Yung
(2009)
0
comments
Cited
73
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2015
Publication date (Online):
August 12 2015
Pages
: 117-129
DOI:
10.1007/978-3-662-48116-5_6
SO-VID:
94287e5d-8612-4dcc-88f4-a746a2f24a18
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Shift Register Sequences – A Retrospective Account
pp. 3
Sense of Presence and Cybersickness While Cycling in Virtual Environments: Their Contribution to Subjective Experience
pp. 11
Efficient Use of Geometric Constraints for Sliding-Window Object Detection in Video
pp. 17
Evolving Atomic Aesthetics and Dynamics
pp. 19
Design and Evaluation of a Processing-in-Memory Architecture for the Smart Memory Cube
pp. 21
Automatic Parameter Tuning with Metaheuristics of the AODV Routing Protocol for Vehicular Ad-Hoc Networks
pp. 22
Implementation of EEG Emotion Recognition System Based on Hierarchical Convolutional Neural Networks
pp. 34
Comparison of Kinect V1 and V2 Depth Images in Terms of Accuracy and Precision
pp. 25
A Novel Approach to the 2D Analytic Signal
pp. 32
Go with the Dual Flow: Evaluating the Psychophysiological Adaptive Fitness Game Environment “Plunder Planet”
pp. 55
Inheritance as an Incremental Modification Mechanism or What Like Is and Isn’t Like
pp. 6
Engagement vs. Deceit: Virtual Humans with Human Autobiographies
pp. 41
On Including Part Hierarchies in Object-Oriented Languages, with an Implementation in Smalltalk
pp. 57
A General Lattice Model for Merging Symbolic Execution Branches
pp. 75
Transaction-Confirmation Time for Bitcoin: A Queueing Analytical Approach to Blockchain Mechanism
pp. 117
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
pp. 65
Multiple Decoupled CPGs with Local Sensory Feedback for Adaptive Locomotion Behaviors of Bio-inspired Walking Robots
pp. 7
Approximating Concept Stability
pp. 85
Older People and Technology Acceptance
pp. 87
Understanding Moderation in Online Mental Health Communities
pp. 88
Urban Renewal: Negotiation Procedures and Evaluation Models
pp. 143
Efficient Unconditionally Secure Signatures Using Universal Hashing
pp. 51
Virtual Robot Experimentation Platform V-REP: A Versatile 3D Robot Simulator
pp. 83
Effects of a 3D Virtual Reality Neurofeedback Scenario on User Experience and Performance in Stroke Patients
pp. 85
Practical Construction of k-Nearest Neighbor Graphs in Metric Spaces
pp. 94
A Theoretical Model of User Engagement in Crowdsourcing
pp. 129
Context-Aware Trustworthy Service Evaluation in Social Internet of Things
pp. 54
Drawing Area-Proportional Venn-3 Diagrams with Convex Polygons
pp. 134
Detection of Driver Drowsiness Using 3D Deep Neural Network and Semi-Supervised Gradient Boosting Machine
pp. 141
Multi-rendezvous Spacecraft Trajectory Optimization with Beam P-ACO
pp. 148
Image Pixelization with Differential Privacy
pp. 85
Handheld AR for Collaborative Edutainment
pp. 97
Social Support and User Engagement in Online Health Communities
pp. 111
Doctor’s Effort Influence on Online Reputation and Popularity
pp. 114
Combining Skeletal Pose with Local Motion for Human Activity Recognition
pp. 114
Achieving the Illusion of Agency
pp. 146
MSTN: Multistage Spatial-Temporal Network for Driver Drowsiness Detection
pp. 207
CAKE: Code-Based Algorithm for Key Encapsulation
pp. 101
Predicting Mental Health Status on Social Media
pp. 129
A SUNNY DAY: Ann and Ron’s World an iPad Application for Children with Autism
pp. 199
Attacker Profiling in Quantitative Security Assessment Based on Attack Trees
pp. 209
Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter
pp. 101
Texture Analysis Based Automated Decision Support System for Classification of Skin Cancer Using SA-SVM
pp. 145
Trajectory Prediction in Campus Based on Markov Chains
pp. 95
Emotional Characters for Automatic Plot Creation
pp. 133
TeenChat: A Chatterbot System for Sensing and Releasing Adolescents’ Stress
pp. 145
Interaction Design of Products for the Elderly in Smart Home Under the Mode of Medical Care and Pension
pp. 191
Fault Injection into VHDL Models: Experimental Validation of a Fault-Tolerant Microcomputer System
pp. 123
Design Criteria for AR-Based Training of Maintenance and Assembly Tasks
pp. 144
Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion
pp. 158
GPU-Accelerated Non-negative Matrix Factorization for Text Mining
pp. 199
Serious Games for Rehabilitation Using Head-Mounted Display and Haptic Devices
pp. 201
A Microsoft HoloLens Mixed Reality Surgical Simulator for Patient-Specific Hip Arthroplasty Training
pp. 175
Automatic Generation of Chord Progressions with an Artificial Immune System
pp. 181
Classification of Motor Imagery EEG Signals with Deep Learning Models
pp. 182
Using Copies to Remove Sensitive Data: A Case Study on Fair Superhero Alignment Prediction
pp. 189
Evaluation of Breastfeeding Mobile Health Applications Based on the Persuasive System Design Model
pp. 240
F-LQE: A Fuzzy Link Quality Estimator for Wireless Sensor Networks
pp. 152
Predicting Co-verbal Gestures: A Deep and Temporal Modeling Approach
pp. 203
End-to-End Learning of Video Super-Resolution with Motion Compensation
pp. 224
A DSS to Assess and Manage the Urban Performances in the Regeneration Plan: The Case Study of Pachino
pp. 178
Exploring the Hybrid Space
pp. 199
Perceived Frequency of Aperiodic Vibrotactile Stimuli Depends on Temporal Encoding
pp. 239
Detecting ARP Spoofing: An Active Technique
pp. 253
Collaborative Design of Urban Spaces Uses: From the Citizen Idea to the Educational Virtual Development
pp. 304
Exploiting Qualitative Spatial Neighborhoods in the Situation Calculus
pp. 198
A Quality Inspection Method to Evaluate E-Government Sites
pp. 204
A Rule-Based Approach to Activity Recognition
pp. 296
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
pp. 319
Contrastive Learning for Unpaired Image-to-Image Translation
pp. 363
Leveraging a Cluster-Booster Architecture for Brain-Scale Simulations
pp. 225
Lagrangian Relaxation Applied to Sparse Global Network Alignment
pp. 253
Why Are Persuasive Strategies Effective? Exploring the Strengths and Weaknesses of Socially-Oriented Persuasive Strategies
pp. 158
Approximate solution of optimal control problems using third order hermite polynomial functions
pp. 235
A Multi-channel EMG-Driven FES Solution for Stroke Rehabilitation
pp. 200
An Exploration of Visual Complexity
pp. 249
Claims and Evidence for Architecture-Based Self-adaptation: A Systematic Literature Review
pp. 256
Coverage-Enhancing Algorithm for Directional Sensor Networks
pp. 375
Expansion Tree Proofs and Their Conversion to Natural Deduction Proofs
pp. 209
Enhancing Speech-Based Depression Detection Through Gender Dependent Vowel-Level Formant Features
pp. 220
Input Separability in Living Liquid State Machines
pp. 227
The West Pomeranian University of Technology Ear Database – A Tool for Testing Biometric Algorithms
pp. 245
How Real Is Good Enough? Assessing Realism of Presence in Simulations and Its Effects on Decision Making
pp. 251
A Design Methodology for Trust Cue Calibration in Cognitive Agents
pp. 328
Can Online Emotions Predict the Stock Market in China?
pp. 332
Factors Influencing Proxy Internet Health Information Seeking Among the Elderly in Rural China: A Grounded Theory Study
pp. 225
iCanLearn: A Mobile Application for Creating Flashcards and Social Stories™ for Children with Autism
pp. 247
A Revisit of the Measurements on Engagement in Videogames: A New Scale Development
pp. 251
RoboComp: A Tool-Based Robotics Framework
pp. 267
Assessing Collaboration Quality in Synchronous CSCL Problem-Solving Activities: Adaptation and Empirical Evaluation of a Rating Scheme
pp. 269
Immersion in Cardboard VR Compared to a Traditional Head-Mounted Display
pp. 241
Development of a Virtual Reality Bicycle Simulator for Rehabilitation Training of Postural Balance
pp. 278
Performance Evaluation Metrics and Statistics for Positional Tracker Evaluation
pp. 287
Deep 3D Convolutional Neural Network Architectures for Alzheimer’s Disease Diagnosis
pp. 455
Learning Delicate Local Representations for Multi-person Pose Estimation
pp. 284
Data Collection with Multiple Sinks in Wireless Sensor Networks
pp. 305
Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks
pp. 403
A Secure Distributed Video Surveillance System Based on Portable Devices
pp. 266
Fuzzy Inference-Based Reliable Fall Detection Using Kinect and Accelerometer
pp. 403
Mobile Digital Storytelling in a Brazilian Care Home
pp. 300
Parallel CLUSTAL W for PC Clusters
pp. 324
A 3D Convolutional Neural Network Approach for the Diagnosis of Parkinson’s Disease
pp. 407
Do Rumors Diffuse Differently from Non-rumors? A Systematically Empirical Analysis in Sina Weibo for Rumor Identification
pp. 347
Smartphones, Smart Seniors, But Not-So-Smart Apps: A Heuristic Evaluation of Fitness Apps
pp. 406
Plant Leaf Recognition Using Zernike Moments and Histogram of Oriented Gradients
pp. 525
Deep Depth from Focus
pp. 380
EEG Data Driven Animation and Its Application
pp. 471
How Flow and Mindfulness Interact with Each Other in Different Types of Mandala Coloring Activities?
pp. 358
Does Social User Experience Improve Motivation for Runners?
pp. 424
Finding Association Rules That Trade Support Optimally against Confidence
pp. 443
Digital Storytelling and Dementia
pp. 320
A La Recherche du Temps Perdu, or As Time Goes By: Where Does the Time Go in a Reading Tutor That Listens?
pp. 343
Some notes on the nearest neighbour interchange distance
pp. 465
Iterative Semi-Global Matching for Robust Driver Assistance Systems
pp. 394
Food Ingredients Recognition Through Multi-label Learning
pp. 517
Nature Inspired Scenes for Guided Mindfulness Training: Presence, Perceived Restorativeness and Meditation Depth
pp. 469
Improving Network Convergence Time and Network Stability of an OSPF-Routed IP Network
pp. 486
Exploration on Generating Traditional Chinese Medicine Prescriptions from Symptoms with an End-to-End Approach
pp. 437
SUCCESS: A New Approach for Semi-supervised Classification of Time-Series
pp. 499
kNN Algorithm with Data-Driven k Value
pp. 396
Effects of Long-Term Myoelectric Signals on Pattern Recognition
pp. 532
The Big Meaning of Small Messages: The Use of WhatsApp in Intergenerational Family Communication
pp. 578
Design of a Kiosk Type Healthcare Robot System for Older People in Private and Public Places
pp. 477
Optimizing the Induction of Alternating Decision Trees
pp. 587
The Case for Docker in Multicloud Enabled Bioinformatics Applications
pp. 516
Evaluation of Deep Models for Real-Time Small Object Detection
pp. 698
CPG Driven RBF Network Control with Reinforcement Learning for Gait Optimization of a Dung Beetle-Like Robot
pp. 473
A Surface Defect Detection Method Based on Positive Samples
pp. 520
Intelligent Wristbands for the Automatic Detection of Emotional States for the Elderly
pp. 509
Customers’ Activity Recognition in Intelligent Retail Environments
pp. 523
Metamodels for Fast Multi-objective Optimization: Trading Off Global Exploration and Local Exploitation
pp. 602
Acquisition of Process Descriptions from Surgical Interventions
pp. 653
A Reversible Data Hiding Scheme for JPEG Images
pp. 490
Effects of Presence on Causing Cybersickness in the Elderly within a 3D Virtual Store
pp. 493
Separation of Rhythms of EEG Signals Based on Hilbert-Huang Transformation with Application to Seizure Detection
pp. 651
Backchannel Head Nods in Danish First Meeting Encounters with a Humanoid Robot: The Role of Physical Embodiment
pp. 678
A Rapid Scene Depth Estimation Model Based on Underwater Light Attenuation Prior for Underwater Image Restoration
pp. 497
A Diversity-Guided Quantum-Behaved Particle Swarm Optimization Algorithm
pp. 610
On the Prediction of Floor Identification Credibility in RSS-Based Positioning Techniques
pp. 725
Fully Combined Convolutional Network with Soft Cost Function for Traffic Scene Parsing
pp. 816
Pricing for Heterogeneous Services at a Discriminatory Processor Sharing Queue
pp. 616
Domain Adaptive Classification for Compensating Variability in Histopathological Whole Slide Images
pp. 652
Multi-Brain Games: Cooperation and Competition
pp. 641
Classification Results of Artificial Neural Networks for Alzheimer’s Disease Detection
pp. 649
An Automatic Segmentation and Reconstruction of Mandibular Structures from CT-Data
pp. 783
A Lightweight Mobile System for Crop Disease Diagnosis
pp. 899
Bio-inspired Multi-layer Spiking Neural Network Extracts Discriminative Features from Speech Signals
Similar content
2,461
Origin of life. A simpler nucleic acid.
Authors:
L Orgel
Why Galaxies are Indeed Simpler than Expected
Authors:
Jun-Sung Moon
,
Jounghun Lee
Corrigendum a new simpler linear-time dominators algorithm
Authors:
Adam Buchsbaum
,
Haim Kaplan
,
Anne Rogers
…
See all similar
Cited by
10
Counting Keys in Parallel After a Side Channel Attack
Authors:
Daniel P. Martin
,
Jonathan F. O’Connell
,
Elisabeth Oswald
…
Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach
Authors:
Romain Poussier
,
François-Xavier Standaert
,
Vincent Grosso
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
Authors:
Ahmad Moghimi
,
Jan Wichelmann
,
Thomas Eisenbarth
…
See all cited by