Differential power analysis of the Picnic signature scheme
From MaRDI portal
Publication:2118537
DOI10.1007/978-3-030-81293-5_10zbMATH Open1485.94139OpenAlexW3013381209MaRDI QIDQ2118537FDOQ2118537
Thomas Eisenbarth, Okan Şeker, Tim Gellersen
Publication date: 22 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81293-5_10
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Distributed systems (68M14) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Unbalanced Oil and Vinegar Signature Schemes
- Power Analysis Attacks
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Ciphers for MPC and FHE
- Efficient cache attacks on AES, and countermeasures
- BBQ: using AES in Picnic signatures
- Grafting trees: a fault attack against the SPHINCS framework
- Security of hedged Fiat-Shamir signatures under fault attacks
- Differential computation analysis: hiding your white-box designs is not enough
- Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Faster Hash-Based Signatures with Bounded Leakage
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
Uses Software
This page was built for publication: Differential power analysis of the Picnic signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2118537)