Pages that link to "Item:Q5418710"
From MaRDI portal
The following pages link to Higher Order Masking of Look-Up Tables (Q5418710):
Displayed 19 items.
- Correlation power analysis and higher-order masking implementation of WAGE (Q832394) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- Statistical properties of side-channel and fault injection attacks using coding theory (Q1749798) (← links)
- Multivariate high-order attacks of shuffled tables recomputation (Q1753166) (← links)
- On the power of expansion: more efficient constructions in the random probing model (Q2056735) (← links)
- Secure wire shuffling in the probing model (Q2128997) (← links)
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} (Q2170090) (← links)
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON (Q2790039) (← links)
- Polynomial Evaluation and Side Channel Analysis (Q2803637) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers (Q2975800) (← links)
- Consolidating Masking Schemes (Q3457138) (← links)
- Detecting Flawed Masking Schemes with Leakage Detection Tests (Q4639478) (← links)
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks (Q4639480) (← links)
- A VLSI implementation of an SM4 algorithm resistant to power analysis (Q5275271) (← links)
- How Fast Can Higher-Order Masking Be in Software? (Q5738890) (← links)
- Codes for Side-Channel Attacks and Protections (Q5739021) (← links)
- Unconditionally secure computation against low-complexity leakage (Q5918097) (← links)
- Correction to: ``Unconditionally secure computation against low-complexity leakage'' (Q5925544) (← links)