Follow
Luke Mather
Luke Mather
Researcher in Applied Cryptography, University of Bristol
Verified email at bristol.ac.uk
Title
Cited by
Cited by
Year
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
L Mather, E Oswald, J Bandenburg, M Wójcik
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1082013
An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis
C Whitnall, E Oswald, L Mather
International Conference on Smart Card Research and Advanced Applications …, 2011
1012011
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
L Mather, E Oswald, C Whitnall
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
522014
Characterisation and estimation of the key rank distribution in the context of side channel evaluations
DP Martin, L Mather, E Oswald, M Stam
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
382016
Pinpointing side-channel information leaks in web applications
L Mather, E Oswald
Journal of Cryptographic Engineering 2, 161-177, 2012
28*2012
Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
DP Martin, L Mather, E Oswald
Cryptographers’ Track at the RSA Conference, 394-412, 2018
212018
How low can you go? Using side-channel data to enhance brute-force key recovery
J Longo, DP Martin, L Mather, E Oswald, B Sach, M Stam
Cryptology ePrint Archive, 2016
192016
Choosing distinguishers for differential power analysis attacks
E Oswald, L Mather, C Whitnall
Non-Invasive Attack Testing Workshop, 1-14, 2011
92011
Comparing key rank estimation methods
R Young, L Mather, E Oswald
International Conference on Smart Card Research and Advanced Applications …, 2022
12022
Dual-phase side-channel evaluations: leakage detection and exploitation
L Mather
University of Bristol, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–10