Side Channel Cryptanalysis of a Higher Order Masking Scheme
From MaRDI portal
Publication:3525056
DOI10.1007/978-3-540-74735-2_3zbMath1300.94048OpenAlexW2155861318MaRDI QIDQ3525056
Matthieu Rivain, Emmanuel Prouff, Jean-Sébastien Coron
Publication date: 16 September 2008
Published in: Cryptographic Hardware and Embedded Systems - CHES 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74735-2_3
Related Items (11)
Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ Threshold Implementation in Software ⋮ Detecting Flawed Masking Schemes with Leakage Detection Tests ⋮ Montgomery’s Trick and Fast Implementation of Masked AES ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Tornado: automatic generation of probing-secure masked bitsliced implementations
This page was built for publication: Side Channel Cryptanalysis of a Higher Order Masking Scheme