Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2612816951 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2015. 17th international workshop, Saint-Malo, France, September 13--16, 2015. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17--19, 2016. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verified Proofs of Higher-Order Masking / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mutual information analysis: a comprehensive study / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal side-channel attacks and countermeasures on the ISW masking scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness Complexity of Private Circuits for Multiplication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Threshold Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A More Efficient AES Threshold Implementation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking AES with \(d+1\) shares in hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conversion of Security Proofs from One Leakage Model to Another: A New Issue / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side Channel Cryptanalysis of a Higher Order Masking Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making Masking Security Proofs Concrete / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards easy leakage certification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Cryptography from the Inner-Product Extractor / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synthesis of Masking Countermeasures against Side Channel Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical Tools Flavor Side-Channel Collision Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pushing the Limits: A Very Compact and a Threshold Implementation of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side-channel resistant crypto for less than 2,300 GE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical Analysis of Second Order Differential Power Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Consolidating Masking Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Higher-Order Masking of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage assessment methodology. A clear roadmap for side-channel evaluations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 22:44, 13 July 2024

scientific article; zbMATH DE number 6729677
Language Label Description Also known as
English
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
scientific article; zbMATH DE number 6729677

    Statements

    Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    13 June 2017
    0 references
    0 references

    Identifiers