Multivariate high-order attacks of shuffled tables recomputation
From MaRDI portal
Publication:1753166
DOI10.1007/S00145-017-9259-7zbMATH Open1444.94050OpenAlexW2290839136MaRDI QIDQ1753166FDOQ1753166
Authors: Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia
Publication date: 28 May 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9259-7
Recommendations
Cites Work
- Title not available (Why is that?)
- Statistical Analysis of Second Order Differential Power Analysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Selected Areas in Cryptography
- The world is not enough: another look on second-order DPA
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2006
- Towards sound approaches to counteract power-analysis attacks
- Provably secure higher-order masking of AES
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- A statistical model for DPA with novel algorithmic confusion analysis
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Template Attacks on Masking—Resistance Is Futile
- Horizontal Correlation Analysis on Exponentiation
- Higher order masking of look-up tables
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Masks will fall off. Higher-order optimal distinguishers
- Masking tables -- an underestimated security risk
- A key to success. Success exponents for side-channel distinguishers
- A first-order leak-free masking countermeasure
- Algebra and trigonometry
- A statistical model for higher order DPA on masked devices
Cited In (4)
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Boosting higher-order correlation attacks by dimensionality reduction
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Security Evaluation Against Side-Channel Analysis at Compilation Time
This page was built for publication: Multivariate high-order attacks of shuffled tables recomputation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1753166)