Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (Q2120989): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4797806 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Threshold Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Boolean Functions for Cryptography and Coding Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Decomposition for Probing Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Multiparty AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking AES with \(d+1\) shares in hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: First-Order Differential Power Analysis on the Duplication Method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Affine Masking against Higher-Order Side Channel Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Multiplicative Masking of Power Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Montgomery’s Trick and Fast Implementation of Masked AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425702 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502779 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pushing the Limits: A Very Compact and a Threshold Implementation of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Higher-Order Masking of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474199 / rank
 
Normal rank
Property / cites work
 
Property / cites work: DPA Leakage Models for CMOS Logic Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms for Switching between Boolean and Arithmetic Masking of Second Order / rank
 
Normal rank

Latest revision as of 12:45, 28 July 2024

scientific article
Language Label Description Also known as
English
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
scientific article

    Statements

    Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (English)
    0 references
    0 references
    0 references
    0 references
    1 April 2022
    0 references
    SCA
    0 references
    threshold implementations
    0 references
    AES
    0 references
    masking
    0 references
    sharing
    0 references
    secure polynomial evaluation
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers