Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(5 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s12095-014-0113-6 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q58765004 / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s12095-014-0113-6 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2118432793 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Symmetric Encryption via Re-keying / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side Channel Cryptanalysis of a Higher Order Masking Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Leakage-Resilient Symmetric Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Statistical Model for DPA with Novel Algorithmic Confusion Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502779 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applied Cryptography and Network Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power Analysis Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pushing the Limits: A Very Compact and a Threshold Implementation of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2005. 7th international workshop, Edinburgh, UK, August 29--September 1, 2005. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Side-Channel Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Exact Success Rate of Side Channel Analysis in the Gaussian Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Higher-Order Masking of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Evaluations beyond Computing Power / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness / rank
 
Normal rank
Property / DBLP publication ID
 
Property / DBLP publication ID: journals/ccds/BelaidGS15 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S12095-014-0113-6 / rank
 
Normal rank

Latest revision as of 07:20, 10 December 2024

scientific article
Language Label Description Also known as
English
Masking and leakage-resilient primitives: one, the other(s) or both?
scientific article

    Statements

    Masking and leakage-resilient primitives: one, the other(s) or both? (English)
    0 references
    0 references
    0 references
    18 November 2015
    0 references
    side-channel attacks
    0 references
    leakage-resilience
    0 references
    pseudorandom number generators and functions
    0 references
    security evaluations
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers