Correlation power analysis and higher-order masking implementation of WAGE
From MaRDI portal
Recommendations
- Hamming weight attacks on cryptographic hardware -- breaking masking defense
- How fast can higher-order masking be in software?
- Block ciphers that are easier to mask: how far can we go?
- Reconciling \((d+1)\) masking in hardware and software
- A secure against high order DPA attacks AES coprocessor based on masking scheme
Cites work
- scientific article; zbMATH DE number 1979273 (Why is no real title available?)
- scientific article; zbMATH DE number 1878336 (Why is no real title available?)
- scientific article; zbMATH DE number 1878339 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Consolidating masking schemes
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Fast Software Encryption
- Faster evaluation of sboxes via common shares
- Higher order masking of look-up tables
- Higher-order masking schemes for S-boxes
- Higher-order side channel security and mask refreshing
- Masking AES with \(d+1\) shares in hardware
- Power Analysis Attacks
- Provably secure higher-order masking of AES
- Reconciling \((d+1)\) masking in hardware and software
- Side-channel analysis of six SHA-3 candidates
- Soft analytical side-channel attacks
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Towards sound approaches to counteract power-analysis attacks
- Verified Proofs of Higher-Order Masking
Cited in
(3)
This page was built for publication: Correlation power analysis and higher-order masking implementation of WAGE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832394)