Dummy shuffling against algebraic attacks in white-box implementations
From MaRDI portal
Publication:2056730
DOI10.1007/978-3-030-77886-6_8zbMATH Open1479.94129OpenAlexW3157937103WikidataQ119496630 ScholiaQ119496630MaRDI QIDQ2056730FDOQ2056730
Authors: Alex Biryukov, Aleksei Udovenko
Publication date: 8 December 2021
Full work available at URL: https://eprint.iacr.org/2021/290
Recommendations
Cites Work
- Noise-tolerant learning, the parity problem, and the statistical query model
- Advances in Cryptology - CRYPTO 2003
- Robust pseudorandom generators
- Title not available (Why is that?)
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Applied Cryptography and Network Security
- LPN decoded
- Differential computation analysis: hiding your white-box designs is not enough
- A white-box DES implementation for DRM applications
- Title not available (Why is that?)
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Selected Areas in Cryptography
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
- Attacks and countermeasures for white-box designs
- Side-channel masking with pseudo-random generator
- Higher-order DCA against standard side-channel countermeasures
Cited In (3)
This page was built for publication: Dummy shuffling against algebraic attacks in white-box implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056730)