Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
From MaRDI portal
Publication:2120989
DOI10.1007/s12095-021-00497-9zbMath1485.94103OpenAlexW3186156404MaRDI QIDQ2120989
Emmanuel Prouff, Simon Landry, Yanis Linge
Publication date: 1 April 2022
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-021-00497-9
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Masking AES with \(d+1\) shares in hardware
- Higher-Order Threshold Implementations
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- Montgomery’s Trick and Fast Implementation of Masked AES
- Affine Masking against Higher-Order Side Channel Analysis
- Algorithms for Switching between Boolean and Arithmetic Masking of Second Order
- Algebraic Decomposition for Probing Security
- DPA Leakage Models for CMOS Logic Circuits
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Secure Multiplicative Masking of Power Functions
- Provably Secure Higher-Order Masking of AES
- Secure Multiparty AES
- Towards sound approaches to counteract power-analysis attacks
- Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing
- Boolean Functions for Cryptography and Coding Theory
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Advances in Cryptology - CRYPTO 2003
- First-Order Differential Power Analysis on the Duplication Method
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2005
- Theory of Cryptography
This page was built for publication: Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version