Follow
Luke Mather
Luke Mather
Researcher in Applied Cryptography, University of Bristol
Verified email at bristol.ac.uk
Title
Cited by
Cited by
Year
Does my device leak information? an a priori statistical power analysis of leakage detection tests
L Mather, E Oswald, J Bandenburg, M Wójcik
International Conference on the Theory and Application of Cryptology and …, 2013
992013
An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis
C Whitnall, E Oswald, L Mather
International Conference on Smart Card Research and Advanced Applications …, 2011
932011
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
L Mather, E Oswald, C Whitnall
International Conference on the Theory and Application of Cryptology and …, 2014
522014
Characterisation and estimation of the key rank distribution in the context of side channel evaluations
DP Martin, L Mather, E Oswald, M Stam
International Conference on the Theory and Application of Cryptology and …, 2016
392016
Pinpointing side-channel information leaks in web applications
L Mather, E Oswald
Journal of Cryptographic Engineering 2 (3), 161-177, 2012
27*2012
Two sides of the same coin: counting and enumerating keys post side-channel attacks revisited
DP Martin, L Mather, E Oswald
Cryptographers’ Track at the RSA Conference, 394-412, 2018
192018
How low can you go? Using side-channel data to enhance brute-force key recovery
J Longo, DP Martin, L Mather, E Oswald, B Sach, M Stam
Cryptology ePrint Archive, 2016
182016
Choosing distinguishers for differential power analysis attacks
E Oswald, L Mather, C Whitnall
Non-Invasive Attack Testing Workshop, 1-14, 2011
92011
Comparing key rank estimation methods
R Young, L Mather, E Oswald
Cryptology ePrint Archive, 2022
12022
Dual-phase side-channel evaluations: leakage detection and exploitation
L Mather
University of Bristol, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–10