Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: How Far Can We Go Beyond Linear Cryptanalysis? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory and Practice of a Leakage Resilient Masking Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2014. 16th international workshop, Busan, South Korea, September 23--26, 2014. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal side-channel attacks and countermeasures on the ISW masking scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking and leakage-resilient primitives: one, the other(s) or both? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semantic Security for the Wiretap Channel / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage squeezing: optimal implementation and security evaluation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Masking Schemes for S-Boxes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conversion of Security Proofs from One Leakage Model to Another: A New Issue / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side Channel Cryptanalysis of a Higher Order Masking Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Side Channel Security and Mask Refreshing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elements of Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Statistical Model for Higher Order DPA on Masked Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shannon Impossibility, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Certify the Leakage of a Chip? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards easy leakage certification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noisy Leakage Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Statistical Model for DPA with Novel Algorithmic Confusion Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Affine Masking against Higher-Order Side Channel Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting AES with Shamir’s Secret Sharing Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Masked S-Boxes Processing – A Step Forward – / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking proofs are tight and how to exploit it in security evaluations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Estimate the Success Rate of Higher-Order Side-Channel Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power Analysis Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counting Keys in Parallel After a Side Channel Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11--15, 2014. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2008. 10th international workshop, Washington, D.C., USA, August 10--13, 2008. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attack on a Higher-Order Masking of the AES Based on Homographic Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Exact Success Rate of Side Channel Analysis in the Gaussian Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Higher-Order Masking of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking with Randomized Look Up Tables / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Evaluations beyond Computing Power / rank
 
Normal rank
Property / cites work
 
Property / cites work: Soft Analytical Side-Channel Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings / rank
 
Normal rank

Revision as of 02:49, 21 July 2024

scientific article
Language Label Description Also known as
English
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
scientific article

    Statements

    Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (English)
    0 references
    0 references
    0 references
    27 November 2019
    0 references
    side-channel analysis
    0 references
    masking
    0 references
    security proofs
    0 references
    fair evaluations
    0 references
    0 references
    0 references
    0 references

    Identifiers