Cryptanalysis of masked ciphers: a not so random idea (Q2692369): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: PRESENT / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_27 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3082135691 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verified Proofs of Higher-Order Masking / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block cipher invariants as eigenvectors of correlation matrices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Threshold Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3081625 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear Cryptanalysis of Reduced-Round PRESENT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Side Channel Security and Mask Refreshing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Spectral characterization of iterating lossy mappings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484903 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wide Trail Design Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3995195 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Amortizing randomness complexity in private circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502779 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The PHOTON Family of Lightweight Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side-Channel Analysis Protection and Low-Latency in Action / rank
 
Normal rank
Property / cites work
 
Property / cites work: Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Implementations Against Side-Channel Attacks and Glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Consolidating Masking Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4126536 / rank
 
Normal rank

Latest revision as of 18:07, 31 July 2024

scientific article
Language Label Description Also known as
English
Cryptanalysis of masked ciphers: a not so random idea
scientific article

    Statements

    Cryptanalysis of masked ciphers: a not so random idea (English)
    0 references
    0 references
    0 references
    0 references
    21 March 2023
    0 references
    linear cryptanalysis
    0 references
    masking
    0 references
    probing security
    0 references
    side-channel analysis
    0 references
    threshold implementations
    0 references
    0 references
    0 references
    0 references

    Identifiers