Pages that link to "Item:Q2948337"
From MaRDI portal
The following pages link to Making Masking Security Proofs Concrete (Q2948337):
Displayed 20 items.
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Fast verification of masking schemes in characteristic two (Q2056733) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- How to fool a black box machine learning based side-channel security evaluation (Q2120993) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations (Q2958136) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Ridge-Based Profiled Differential Power Analysis (Q2975816) (← links)
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note (Q3179482) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks (Q4639480) (← links)
- Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration (Q4975181) (← links)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889) (← links)
- Codes for Side-Channel Attacks and Protections (Q5739021) (← links)
- Systematic study of decryption and re-encryption leakage: the case of Kyber (Q6086403) (← links)
- Removing the field size loss from Duc et al.'s conjectured bound for masked encodings (Q6088705) (← links)
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption (Q6091130) (← links)
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model (Q6145951) (← links)