Soft Analytical Side-Channel Attacks

From MaRDI portal
Publication:2938850

DOI10.1007/978-3-662-45611-8_15zbMath1306.94096OpenAlexW1736874106MaRDI QIDQ2938850

Benoît Gérard, Nicolas Veyrat-Charvillon, François-Xavier Standaert

Publication date: 16 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_15




Related Items (20)

Correlation power analysis and higher-order masking implementation of WAGESecurity analysis of deterministic re-keying with masking and shuffling: application to ISAPOn the worst-case side-channel security of ECC point randomization in embedded devicesHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataEffective and efficient masking with low noise using small-Mersenne-prime ciphersSystematic study of decryption and re-encryption leakage: the case of KyberASCA vs. SASCA. A closer look at the AES key scheduleRemoving the field size loss from Duc et al.'s conjectured bound for masked encodings\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionCombined fault and leakage resilience: composability, constructions and compilerFault-enabled chosen-ciphertext attacks on KyberBeyond birthday bound secure fresh rekeying: application to authenticated encryptionSecurity Evaluation Against Side-Channel Analysis at Compilation TimeVectorizing Higher-Order MaskingMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionRobust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksFast and Memory-Efficient Key Recovery in Side-Channel Attacks\textsc{Friet}: an authenticated encryption scheme with built-in fault detectionMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleSingle-trace side-channel analysis on polynomial-based MAC schemes




This page was built for publication: Soft Analytical Side-Channel Attacks