Effective and efficient masking with low noise using small-Mersenne-prime ciphers (Q6061536): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Feistel structures for MPC, and more / rank
 
Normal rank
Property / cites work
 
Property / cites work: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shuffling Cards and Stopping Times / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: Consolidating inner product masking / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verified Proofs of Higher-Order Masking / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal side-channel attacks and countermeasures on the ISW masking scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness Complexity of Private Circuits for Multiplication / rank
 
Normal rank
Property / cites work
 
Property / cites work: A fast new DES implementation in software / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 4th international workshop, FSE '97, Haifa, Israel, January 20--22, 1997. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Formal verification of masked hardware implementations in the presence of glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptography in Genus 2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardware Private Circuits: From Trivial Composition to Full Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941870 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Transciphering framework for approximate homomorphic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Template Attacks on Different Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conversion of Security Proofs from One Leakage Model to Another: A New Issue / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wide Trail Design Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version / rank
 
Normal rank
Property / cites work
 
Property / cites work: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Circuits without Computational Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Amplification of Noisy Leakages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Affine Masking against Higher-Order Side Channel Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502779 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How Fast Can Higher-Order Masking Be in Software? / rank
 
Normal rank
Property / cites work
 
Property / cites work: On a generalization of substitution-permutation networks: the HADES design strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Vectorizing Higher-Order Masking / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking proofs are tight and how to exploit it in security evaluations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The interpolation attack on block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3285014 / rank
 
Normal rank
Property / cites work
 
Property / cites work: SILVER -- statistical independence and leakage verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: The cipher SHARK / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Higher-Order Masking of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Soft Analytical Side-Channel Attacks / rank
 
Normal rank

Latest revision as of 11:20, 21 August 2024

scientific article; zbMATH DE number 7774133
Language Label Description Also known as
English
Effective and efficient masking with low noise using small-Mersenne-prime ciphers
scientific article; zbMATH DE number 7774133

    Statements

    Effective and efficient masking with low noise using small-Mersenne-prime ciphers (English)
    0 references
    0 references
    0 references
    0 references
    8 December 2023
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references