Higher-Order Threshold Implementations
From MaRDI portal
Publication:2936616
DOI10.1007/978-3-662-45608-8_18zbMATH Open1317.94086OpenAlexW1567394420MaRDI QIDQ2936616FDOQ2936616
Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Vincent Rijmen, Ventzislav Nikov
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2474.pdf
Recommendations
- Uniform first-order threshold implementations
- About complexity of implementing threshold functions
- Improved approximation of linear threshold functions
- On dynamic threshold schemes
- Threshold functions
- scientific article; zbMATH DE number 3912274
- Revising threshold functions
- scientific article; zbMATH DE number 3988712
- Parallel computation with threshold functions
- Improving first-order threshold implementations of \textsf{SKINNY}
Cited In (26)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- How Fast Can Higher-Order Masking Be in Software?
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Detecting Flawed Masking Schemes with Leakage Detection Tests
- Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks
- Masking Large Keys in Hardware: A Masked Implementation of McEliece
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
- Protecting Triple-DES Against DPA
- Reducing Randomness Complexity of Mask Refreshing Algorithm
- Resilient uniformity: applying resiliency in masking
- Arithmetic Addition over Boolean Masking
- Threshold Implementations Against Side-Channel Attacks and Glitches
- A low-randomness second-order masked AES
- Affine Equivalence and Its Application to Tightening Threshold Implementations
- CAPABARA: a combined attack on CAPA
- Hiding Higher-Order Side-Channel Leakage
- Energy consumption of protected cryptographic hardware cores. An experimental study
- Secret can be public: low-memory AEAD mode for high-order masking
- Uniform first-order threshold implementations
- Cryptanalysis of masked ciphers: a not so random idea
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- Side-Channel Analysis Protection and Low-Latency in Action
- Improving first-order threshold implementations of \textsf{SKINNY}
- Threshold counters with increments and decrements
This page was built for publication: Higher-Order Threshold Implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936616)