Pages that link to "Item:Q656520"
From MaRDI portal
The following pages link to Side-channel resistant crypto for less than 2,300 GE (Q656520):
Displaying 29 items.
- Secure hardware implementation of nonlinear functions in the presence of glitches (Q656517) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Uniform first-order threshold implementations (Q1698616) (← links)
- Fault template attacks on block ciphers exploiting fault propagation (Q2055630) (← links)
- Lightweight authenticated encryption mode suitable for threshold implementation (Q2119030) (← links)
- Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials (Q2121013) (← links)
- Decomposition of permutations in a finite field (Q2632833) (← links)
- Succinct Diophantine-satisfiability arguments (Q2691605) (← links)
- SILVER -- statistical independence and leakage verification (Q2692368) (← links)
- Arithmetic Addition over Boolean Masking (Q2794517) (← links)
- On the Security of RSM - Presenting 5 First- and Second-Order Attacks (Q2794598) (← links)
- Affine Equivalence and Its Application to Tightening Threshold Implementations (Q2807212) (← links)
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks (Q2829219) (← links)
- Complementing Feistel Ciphers (Q2946868) (← links)
- Side-Channel Analysis Protection and Low-Latency in Action (Q2958135) (← links)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not (Q2958149) (← links)
- Hiding Higher-Order Side-Channel Leakage (Q2975801) (← links)
- Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes (Q3193255) (← links)
- On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis (Q3297551) (← links)
- Protecting Triple-DES Against DPA (Q3297558) (← links)
- Threshold Implementation in Software (Q3297560) (← links)
- Algebraic Decomposition for Probing Security (Q3457137) (← links)
- Consolidating Masking Schemes (Q3457138) (← links)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889) (← links)
- How Fast Can Higher-Order Masking Be in Software? (Q5738890) (← links)
- Learn from your faults: leakage assessment in fault attacks using deep learning (Q6110383) (← links)
- From substitution box to threshold (Q6623294) (← links)