Does my device leak information? an a priori statistical power analysis of leakage detection tests L Mather, E Oswald, J Bandenburg, M Wójcik International Conference on the Theory and Application of Cryptology and …, 2013 | 79 | 2013 |
An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis C Whitnall, E Oswald, L Mather International Conference on Smart Card Research and Advanced Applications …, 2011 | 79 | 2011 |
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer L Mather, E Oswald, C Whitnall International Conference on the Theory and Application of Cryptology and …, 2014 | 42 | 2014 |
Characterisation and estimation of the key rank distribution in the context of side channel evaluations DP Martin, L Mather, E Oswald, M Stam International Conference on the Theory and Application of Cryptology and …, 2016 | 29 | 2016 |
Pinpointing side-channel information leaks in web applications L Mather, E Oswald Journal of Cryptographic Engineering 2 (3), 161-177, 2012 | 26* | 2012 |
Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited DP Martin, L Mather, E Oswald Cryptographers’ Track at the RSA Conference, 394-412, 2018 | 11 | 2018 |
How low can you go? Using side-channel data to enhance brute-force key recovery. J Longo, DP Martin, L Mather, E Oswald, B Sach, M Stam IACR Cryptol. ePrint Arch. 2016, 609, 2016 | 10 | 2016 |
Choosing distinguishers for differential power analysis attacks E Oswald, L Mather, C Whitnall Non-Invasive Attack Testing Workshop, 1-14, 2011 | 8 | 2011 |
Dual-phase side-channel evaluations: leakage detection and exploitation L Mather University of Bristol, 2015 | | 2015 |