DLSCA

12345678910
Across
  1. 2. Measurable leakage during a device's computation.
  2. 3. Metric for average key rank in side-channel attacks
  3. 5. Exploits unintended information leakage from devices.
  4. 7. Common cipher targeted in side-channel studies.
  5. 8. Two-stage side-channel attack method using a clone device.
  6. 9. Countermeasure that randomizes intermediate values.
Down
  1. 1. Attack exploiting weaknesses in practical algorithm use.
  2. 4. Collected measurements of side-channel leakage.
  3. 6. Powerful machine technique for profiling SCA.
  4. 10. Fixed table used for intermediate values in AES.