Multivariate high-order attacks of shuffled tables recomputation
From MaRDI portal
Publication:1753166
Recommendations
Cites work
- scientific article; zbMATH DE number 1504808 (Why is no real title available?)
- scientific article; zbMATH DE number 1759297 (Why is no real title available?)
- scientific article; zbMATH DE number 1759268 (Why is no real title available?)
- scientific article; zbMATH DE number 1878339 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A first-order leak-free masking countermeasure
- A key to success. Success exponents for side-channel distinguishers
- A statistical model for DPA with novel algorithmic confusion analysis
- A statistical model for higher order DPA on masked devices
- Algebra and trigonometry
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Higher order masking of look-up tables
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Horizontal Correlation Analysis on Exponentiation
- Masking tables -- an underestimated security risk
- Masks will fall off. Higher-order optimal distinguishers
- Provably secure higher-order masking of AES
- Selected Areas in Cryptography
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Statistical Analysis of Second Order Differential Power Analysis
- Template Attacks on Masking—Resistance Is Futile
- The world is not enough: another look on second-order DPA
- Topics in Cryptology – CT-RSA 2006
- Towards sound approaches to counteract power-analysis attacks
Cited in
(5)- Boosting higher-order correlation attacks by dimensionality reduction
- Multi-variate high-order attacks of shuffled tables recomputation
- Security evaluation against side-channel analysis at compilation time
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
This page was built for publication: Multivariate high-order attacks of shuffled tables recomputation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1753166)