Masking with randomized look up tables. Towards preventing side-channel attacks of all orders
From MaRDI portal
Publication:2889770
Recommendations
Cited in
(11)- Not so difficult in the end: breaking the lookup table-based affine masking scheme
- Time-memory trade-offs for side-channel resistant implementations of block ciphers
- Masking tables -- an underestimated security risk
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Block ciphers that are easier to mask: how far can we go?
- Selected Areas in Cryptography
- Secret can be public: low-memory AEAD mode for high-order masking
- Higher order masking of look-up tables
- Revisiting a masked lookup-table compression scheme
- Cryptanalysis of masked ciphers: a not so random idea
- Affine Masking against Higher-Order Side Channel Analysis
This page was built for publication: Masking with randomized look up tables. Towards preventing side-channel attacks of all orders
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889770)