A first-order leak-free masking countermeasure
From MaRDI portal
Publication:2890002
Recommendations
- Masking against Side-Channel Attacks: A Formal Security Proof
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- Theory and practice of a leakage resilient masking scheme
- Higher-order side channel security and mask refreshing
- Higher-order masking schemes for S-boxes
Cites work
- scientific article; zbMATH DE number 1979273 (Why is no real title available?)
- scientific article; zbMATH DE number 2081069 (Why is no real title available?)
- scientific article; zbMATH DE number 1504808 (Why is no real title available?)
- scientific article; zbMATH DE number 1759268 (Why is no real title available?)
- scientific article; zbMATH DE number 1878332 (Why is no real title available?)
- scientific article; zbMATH DE number 1878339 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Mutual Information Analysis: How, When and Why?
- Provably secure higher-order masking of AES
- Revisiting Higher-Order DPA Attacks:
- Statistical Analysis of Second Order Differential Power Analysis
- The world is not enough: another look on second-order DPA
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Towards sound approaches to counteract power-analysis attacks
- Vectorial Boolean functions for cryptography
Cited in
(16)- Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
- Multivariate high-order attacks of shuffled tables recomputation
- Leakage squeezing of order two
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- Synthesis of masking countermeasures against side channel attacks
- On the practical security of a leakage resilient masking scheme
- Leakage squeezing: optimal implementation and security evaluation
- Detecting flawed masking schemes with leakage detection tests
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Theory and practice of a leakage resilient masking scheme
- On the security of RSM -- presenting 5 first -- and second-order attacks
- Conversion of security proofs from one leakage model to another: a new issue
- Detecting hidden leakages
- Threshold implementation in software. Case study of PRESENT
- Bitsliced masking and ARM: friends or foes?
This page was built for publication: A first-order leak-free masking countermeasure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2890002)