Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests L Mather, E Oswald, J Bandenburg, M Wójcik Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 111 | 2013 |
An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis C Whitnall, E Oswald, L Mather International Conference on Smart Card Research and Advanced Applications …, 2011 | 104 | 2011 |
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer L Mather, E Oswald, C Whitnall Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 54 | 2014 |
Characterisation and estimation of the key rank distribution in the context of side channel evaluations DP Martin, L Mather, E Oswald, M Stam Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 40 | 2016 |
Pinpointing side-channel information leaks in web applications L Mather, E Oswald Journal of Cryptographic Engineering 2, 161-177, 2012 | 28* | 2012 |
Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited DP Martin, L Mather, E Oswald Cryptographers’ Track at the RSA Conference, 394-412, 2018 | 22 | 2018 |
How low can you go? Using side-channel data to enhance brute-force key recovery J Longo, DP Martin, L Mather, E Oswald, B Sach, M Stam Cryptology ePrint Archive, 2016 | 21 | 2016 |
Choosing distinguishers for differential power analysis attacks E Oswald, L Mather, C Whitnall Non-Invasive Attack Testing Workshop, 1-14, 2011 | 9 | 2011 |
Comparing key rank estimation methods R Young, L Mather, E Oswald International Conference on Smart Card Research and Advanced Applications …, 2022 | 2 | 2022 |
Dual-phase side-channel evaluations: leakage detection and exploitation L Mather University of Bristol, 2015 | | 2015 |