Skip to main navigation
Skip to search
Skip to main content
Ben-Gurion University Research Portal Home
Help & FAQ
Link opens in a new tab
Search content at Ben-Gurion University Research Portal
Home
Profiles
Research output
Research units
Prizes
Press/Media
Student theses
Projects
Activities
Datasets
Research Labs
Side-channel cryptographic attacks using pseudo-boolean optimization
Yossef Oren
, Avishai Wool
Research output
:
Contribution to journal
›
Article
›
peer-review
10
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Side-channel cryptographic attacks using pseudo-boolean optimization'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Secret Key
100%
Side Channel
100%
Pseudo-Boolean Optimization
100%
Cryptographic Attacks
100%
Advanced Encryption Standard
100%
Channel Data
75%
Ciphertext
75%
Attacker
50%
Equation Set
50%
Optimization Methods
50%
Noise Measurement
50%
Cipher
50%
Constraint Solver
50%
Plaintext
50%
Symmetric Block Cipher
50%
Computation Time
25%
Physical Structure
25%
Signal-to-noise Ratio
25%
Cryptographic Devices
25%
Success Probability
25%
Failed Attacks
25%
Set Size
25%
Cryptanalysis
25%
Performance Evaluation
25%
Measured Signal
25%
Deterministic Algorithm
25%
Mathematical Relationship
25%
Known Plaintext
25%
Computer Science
side-channel
100%
Cryptographic Attack
100%
Advanced Encryption Standard
100%
Ciphertext
75%
Attackers
50%
Block Cipher
50%
Constraint Solver
50%
Measurement Noise
50%
Open Source
25%
Noise-to-Signal Ratio
25%
Cryptographic Device
25%
Performance Evaluation
25%
Success Probability
25%
Computation Time
25%
Cryptanalysis
25%
Source Constraint
25%
Successful Attack
25%
Physical Structure
25%