Multivariate high-order attacks of shuffled tables recomputation
From MaRDI portal
Publication:1753166
DOI10.1007/s00145-017-9259-7zbMath1444.94050OpenAlexW2290839136MaRDI QIDQ1753166
Nicolas Bruneau, Yannick Teglia, Zakaria Najm, Sylvain Guilley
Publication date: 28 May 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9259-7
Related Items (2)
Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A First-Order Leak-Free Masking Countermeasure
- Masks Will Fall Off
- Masking Tables—An Underestimated Security Risk
- The World Is Not Enough: Another Look on Second-Order DPA
- Horizontal Correlation Analysis on Exponentiation
- A Key to Success
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Provably Secure Higher-Order Masking of AES
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
- Towards sound approaches to counteract power-analysis attacks
- Statistical Analysis of Second Order Differential Power Analysis
- A Statistical Model for Higher Order DPA on Masked Devices
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Template Attacks on Masking—Resistance Is Futile
- Higher Order Masking of Look-Up Tables
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Multivariate high-order attacks of shuffled tables recomputation