|
|
| Property / cites work |
| | |
| Property / cites work: Feistel structures for MPC, and more / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Shuffling Cards and Stopping Times / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Consolidating inner product masking / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Verified Proofs of Higher-Order Masking / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Horizontal side-channel attacks and countermeasures on the ISW masking scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Randomness Complexity of Private Circuits for Multiplication / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A fast new DES implementation in software / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast software encryption. 4th international workshop, FSE '97, Haifa, Israel, January 20--22, 1997. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4279560 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Formal verification of masked hardware implementations in the presence of glitches / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Cryptography in Genus 2 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Hardware Private Circuits: From Trivial Composition to Full Verification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941870 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Transciphering framework for approximate homomorphic encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Template Attacks on Different Devices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Conversion of Security Proofs from One Leakage Model to Another: A New Issue / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Wide Trail Design Strategy / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2760977 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Circuits without Computational Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Optimal Amplification of Noisy Leakages / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Affine Masking against Higher-Order Side Channel Analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4502779 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How Fast Can Higher-Order Masking Be in Software? / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On a generalization of substitution-permutation networks: the HADES design strategy / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Vectorizing Higher-Order Masking / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking proofs are tight and how to exploit it in security evaluations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The interpolation attack on block ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3285014 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: SILVER -- statistical independence and leakage verification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4934705 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The cipher SHARK / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Provably Secure Higher-Order Masking of AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Soft Analytical Side-Channel Attacks / rank |
| | Normal rank |