Publication | Date of Publication | Type |
---|
Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model | 2024-02-02 | Paper |
Learning with physical rounding for linear and quadratic leakage functions | 2024-02-02 | Paper |
Systematic study of decryption and re-encryption leakage: the case of Kyber | 2023-12-12 | Paper |
Handcrafting: improving automated masking in hardware with manual optimizations | 2023-12-12 | Paper |
Effective and efficient masking with low noise using small-Mersenne-prime ciphers | 2023-12-08 | Paper |
Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder | 2023-10-20 | Paper |
Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher | 2023-08-25 | Paper |
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding | 2023-08-21 | Paper |
Packed multiplication: how to amortize the cost of side-channel masking? | 2023-03-21 | Paper |
\textsf{Scatter}: a missing case? | 2022-12-16 | Paper |
On the worst-case side-channel security of ECC point randomization in embedded devices | 2022-07-06 | Paper |
Security analysis of deterministic re-keying with masking and shuffling: application to ISAP | 2022-06-17 | Paper |
Towards tight random probing security | 2022-04-22 | Paper |
How to fool a black box machine learning based side-channel security evaluation | 2022-04-01 | Paper |
A stealthy hardware Trojan based on a statistical fault attack | 2022-04-01 | Paper |
Hardware Private Circuits: From Trivial Composition to Full Verification | 2022-03-23 | Paper |
A systematic appraisal of side channel evaluation strategies | 2021-07-06 | Paper |
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison | 2020-07-20 | Paper |
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks | 2020-06-24 | Paper |
Very High Order Masking: Efficient Implementation and Security Evaluation | 2020-06-24 | Paper |
Leakage certification revisited: bounding model errors in side-channel security evaluations | 2020-05-20 | Paper |
Improved filter permutators for efficient FHE: better instances and implementations | 2020-05-12 | Paper |
Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher | 2020-05-06 | Paper |
Revisiting location privacy from a side-channel analysis viewpoint | 2020-05-06 | Paper |
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version | 2019-11-27 | Paper |
Masking proofs are tight and how to exploit it in security evaluations | 2018-07-09 | Paper |
Consolidating inner product masking | 2018-04-06 | Paper |
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms | 2018-02-16 | Paper |
Blind source separation from single measurements using singular spectrum analysis | 2018-02-14 | Paper |
Evaluation and improvement of generic-emulating DPA attacks | 2018-02-14 | Paper |
Towards easy leakage certification | 2018-02-14 | Paper |
Simple key enumeration (and rank estimation) using histograms: an integrated approach | 2018-02-14 | Paper |
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model | 2017-06-13 | Paper |
Ridge-Based Profiled Differential Power Analysis | 2017-04-12 | Paper |
Improving the security and efficiency of block ciphers based on LS-designs | 2017-02-10 | Paper |
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations | 2017-02-01 | Paper |
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF | 2017-02-01 | Paper |
Score-Based vs. Probability-Based Enumeration – A Cautionary Note | 2016-12-21 | Paper |
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems | 2016-10-27 | Paper |
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces | 2016-09-09 | Paper |
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts | 2016-09-09 | Paper |
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? | 2016-03-23 | Paper |
Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions | 2016-03-10 | Paper |
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks | 2015-12-04 | Paper |
Masking and leakage-resilient primitives: one, the other(s) or both? | 2015-11-18 | Paper |
SEA: A Scalable Encryption Algorithm for Small Embedded Applications | 2015-11-11 | Paper |
Making Masking Security Proofs Concrete | 2015-09-30 | Paper |
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations | 2015-09-18 | Paper |
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment | 2015-09-18 | Paper |
FPGA Implementations of SPRING | 2015-07-21 | Paper |
Soft Analytical Side-Channel Attacks | 2015-01-16 | Paper |
On a particular case of the bisymmetric equation for quasigroups | 2014-08-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5495948 | 2014-08-07 | Paper |
Efficient Masked S-Boxes Processing – A Step Forward – | 2014-06-24 | Paper |
How to Certify the Leakage of a Chip? | 2014-05-27 | Paper |
The Myth of Generic DPA…and the Magic of Learning | 2014-03-28 | Paper |
Hardware Implementation and Side-Channel Analysis of Lapin | 2014-03-28 | Paper |
Block Ciphers That Are Easier to Mask: How Far Can We Go? | 2013-10-10 | Paper |
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions | 2013-09-02 | Paper |
Security Evaluations beyond Computing Power | 2013-05-31 | Paper |
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note | 2013-03-19 | Paper |
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness | 2013-03-18 | Paper |
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model | 2012-11-13 | Paper |
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting | 2012-11-13 | Paper |
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs | 2012-11-13 | Paper |
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint | 2012-11-13 | Paper |
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation | 2012-08-20 | Paper |
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices | 2012-07-23 | Paper |
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations | 2012-06-29 | Paper |
Masking with Randomized Look Up Tables | 2012-06-08 | Paper |
Mutual information analysis: a comprehensive study | 2012-01-18 | Paper |
Leftover Hash Lemma, Revisited | 2011-08-12 | Paper |
Generic Side-Channel Distinguishers: Improvements and Limitations | 2011-08-12 | Paper |
FPGA Implementation of a Statistical Saturation Attack against PRESENT | 2011-06-29 | Paper |
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices | 2011-05-27 | Paper |
The World Is Not Enough: Another Look on Second-Order DPA | 2010-12-07 | Paper |
Algebraic Side-Channel Attacks | 2010-11-23 | Paper |
How Leaky Is an Extractor? | 2010-08-31 | Paper |
Multi-trail Statistical Saturation Attacks | 2010-07-06 | Paper |
Adaptive Chosen-Message Side-Channel Attacks | 2010-07-06 | Paper |
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices | 2010-05-04 | Paper |
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA | 2009-11-10 | Paper |
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions | 2009-11-10 | Paper |
Mutual Information Analysis: How, When and Why? | 2009-11-10 | Paper |
How to Compare Profiled Side-Channel Attacks? | 2009-06-03 | Paper |
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks | 2009-05-12 | Paper |
Provable security of block ciphers against linear cryptanalysis: a mission impossible? | 2009-03-31 | Paper |
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent | 2008-09-18 | Paper |
Implementation of the AES-128 on Virtex-5 FPGAs | 2008-06-13 | Paper |
Improving the Time Complexity of Matsui’s Linear Cryptanalysis | 2008-05-06 | Paper |
Foundations of Security Analysis and Design III | 2006-11-01 | Paper |
Fast Software Encryption | 2005-12-27 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4425745 | 2003-09-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408197 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408211 | 2003-06-29 | Paper |
Optimization of processes by equipartition | 2000-01-30 | Paper |