DLSCA
Across
- 2. Measurable leakage during a device's computation.
- 3. Metric for average key rank in side-channel attacks
- 5. Exploits unintended information leakage from devices.
- 7. Common cipher targeted in side-channel studies.
- 8. Two-stage side-channel attack method using a clone device.
- 9. Countermeasure that randomizes intermediate values.
Down
- 1. Attack exploiting weaknesses in practical algorithm use.
- 4. Collected measurements of side-channel leakage.
- 6. Powerful machine technique for profiling SCA.
- 10. Fixed table used for intermediate values in AES.