Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: François-Xavier Standaert / rank
Normal rank
 
Property / author
 
Property / author: François-Xavier Standaert / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_21 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2553306305 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797806 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mutual information analysis: a comprehensive study / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Boosting Higher-Order Correlation Attacks by Dimensionality Reduction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Less is more: dimensionality reduction from a theoretical perspective / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masks Will Fall Off / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-variate high-order attacks of shuffled tables recomputation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536231 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher Order Masking of Look-Up Tables / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Statistical Model for Higher Order DPA on Masked Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making Masking Security Proofs Concrete / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2015. 17th international workshop, Saint-Malo, France, September 13--16, 2015. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applied Cryptography and Network Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Gaussian Mixture Models for Higher-Order Side Channel Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power Analysis Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536229 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical Tools Flavor Side-Channel Collision Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Template Attacks on Masking—Resistance Is Futile / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical Analysis of Second Order Differential Power Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Higher-Order Masking of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking Tables—An Underestimated Security Risk / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank

Latest revision as of 08:23, 13 July 2024

scientific article
Language Label Description Also known as
English
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
scientific article

    Statements

    Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    1 February 2017
    0 references
    template attacks
    0 references
    Taylor expansion
    0 references
    shuffled table recomputation
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers