|
|
| Property / cites work |
| | |
| Property / cites work: How Far Can We Go Beyond Linear Cryptanalysis? / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Theory and Practice of a Leakage Resilient Masking Scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2014. 16th international workshop, Busan, South Korea, September 23--26, 2014. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Horizontal side-channel attacks and countermeasures on the ISW masking scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking and leakage-resilient primitives: one, the other(s) or both? / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Semantic Security for the Wiretap Channel / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage squeezing: optimal implementation and security evaluation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Higher-Order Masking Schemes for S-Boxes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4425684 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Conversion of Security Proofs from One Leakage Model to Another: A New Issue / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Side Channel Cryptanalysis of a Higher Order Masking Scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Higher-Order Side Channel Security and Mask Refreshing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Elements of Information Theory / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Statistical Model for Higher Order DPA on Masked Devices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Shannon Impossibility, Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Certify the Leakage of a Chip? / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards easy leakage certification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Noisy Leakage Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Statistical Model for DPA with Novel Algorithmic Confusion Analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Affine Masking against Higher-Order Side Channel Analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Protecting AES with Shamir’s Secret Sharing Scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Masked S-Boxes Processing – A Step Forward – / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking proofs are tight and how to exploit it in security evaluations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941869 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Estimate the Success Rate of Higher-Order Side-Channel Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Power Analysis Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Counting Keys in Parallel After a Side Channel Attack / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11--15, 2014. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2008. 10th international workshop, Washington, D.C., USA, August 10--13, 2008. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Attack on a Higher-Order Masking of the AES Based on Homographic Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Exact Success Rate of Side Channel Analysis in the Gaussian Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Provably Secure Higher-Order Masking of AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking with Randomized Look Up Tables / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security Evaluations beyond Computing Power / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Soft Analytical Side-Channel Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings / rank |
| | Normal rank |