Secure wire shuffling in the probing model
From MaRDI portal
Publication:2128997
DOI10.1007/978-3-030-84252-9_8zbMATH Open1486.94092OpenAlexW3192820170MaRDI QIDQ2128997FDOQ2128997
Authors: Jean-Sébastien Coron, Lorenzo Spignoli
Publication date: 22 April 2022
Full work available at URL: http://orbilu.uni.lu/handle/10993/48507
Recommendations
Cites Work
- Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
- Sorting in \(c \log n\) parallel steps
- Advances in Cryptology - CRYPTO 2003
- Tight bounds on maximal and maximum matchings
- Title not available (Why is that?)
- Algorithms and Data Structures
- Provably secure higher-order masking of AES
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Applied Cryptography and Network Security
- Higher-order masking schemes for S-boxes
- Very high order masking: efficient implementation and security evaluation
- Higher order masking of look-up tables
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
- Circuit compilers with \(O(1/\log (n))\) leakage rate
- Amortizing randomness complexity in private circuits
Cited In (6)
- Wire-tap codes as side-channel countermeasure
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- Unifying freedom and separation for tight probing-secure composition
- Dummy shuffling against algebraic attacks in white-box implementations
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing
Uses Software
This page was built for publication: Secure wire shuffling in the probing model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2128997)