Leakage assessment methodology. A clear roadmap for side-channel evaluations

From MaRDI portal
Publication:1695902

DOI10.1007/978-3-662-48324-4_25zbMath1380.68171OpenAlexW2944942867MaRDI QIDQ1695902

Tobias Schneider, Amir Moradi

Publication date: 14 February 2018

Full work available at URL: https://doi.org/10.1007/978-3-662-48324-4_25




Related Items (23)

Spin me right round rotational symmetry for FPGA-specific AES: extended versionA small GIFT-COFB: lightweight bit-serial architecturesLearn from your faults: leakage assessment in fault attacks using deep learningSide-Channel Analysis Protection and Low-Latency in ActionA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotHigher-order masking scheme for Trivium hardware implementationOn the exact relationship between the mutual information metric and the success rate metricImproving first-order threshold implementations of \textsf{SKINNY}Efficiently masking polynomial inversion at arbitrary orderSecure Implementation of Lattice-Based Encryption SchemesBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsHiding Higher-Order Side-Channel LeakageVectorizing Higher-Order MaskingOn the Use of Independent Component Analysis to Denoise Side-Channel MeasurementsThreshold Implementation in SoftwareA First-Order SCA Resistant AES Without Fresh RandomnessDetecting Flawed Masking Schemes with Leakage Detection TestsParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelArithmetic Addition over Boolean MaskingAffine Equivalence and Its Application to Tightening Threshold ImplementationsParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksAugmenting leakage detection using bootstrappingCustom instruction support for modular defense against side-channel and fault attacks




This page was built for publication: Leakage assessment methodology. A clear roadmap for side-channel evaluations