All Stories

  1. Robust profiled attacks: should the adversary trust the dataset?
  2. Crucial pitfall of DPA Contest V4.2 implementation