Leakage squeezing: optimal implementation and security evaluation
From MaRDI portal
Recommendations
- Optimal First-Order Masking with Linear and Non-linear Bijections
- Leakage squeezing of order two
- A first-order leak-free masking countermeasure
- Higher-order masking schemes for S-boxes
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
Cited in
(6)- Statistical properties of side-channel and fault injection attacks using coding theory
- Leakage squeezing using cellular automata
- Leakage squeezing of order two
- Codes for side-channel attacks and protections
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Leakage squeezing using cellular automata and its application to scan attack
This page was built for publication: Leakage squeezing: optimal implementation and security evaluation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q742019)