Masking tables -- an underestimated security risk
From MaRDI portal
Publication:2946889
Recommendations
Cites work
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 1052006 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- scientific article; zbMATH DE number 1878339 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- A fast and provably secure higher-order masking of AES S-box
- Advances in Cryptology - CRYPTO 2003
- Affine Masking against Higher-Order Side Channel Analysis
- Applied Cryptography and Network Security
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Fast Software Encryption
- Fast Software Encryption
- Generic side-channel distinguishers: improvements and limitations
- Higher-order glitches free implementation of the AES using secure multi-party computation protocols
- Known-Key Distinguishers for Some Block Ciphers
- Power Analysis Attacks
- Provably secure higher-order masking of AES
- Public Key Cryptography - PKC 2005
- The Myth of Generic DPA…and the Magic of Learning
- The world is not enough: another look on second-order DPA
- Topics in Cryptology – CT-RSA 2005
- Topics in Cryptology – CT-RSA 2006
- Towards sound approaches to counteract power-analysis attacks
Cited in
(20)- SCATTER: a new dimension in side-channel
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Masking with randomized look up tables. Towards preventing side-channel attacks of all orders
- Revisiting a masked lookup-table compression scheme
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Template Attacks on Masking—Resistance Is Futile
- Statistical properties of side-channel and fault injection attacks using coding theory
- Hamming weight attacks on cryptographic hardware -- breaking masking defense
- Multivariate high-order attacks of shuffled tables recomputation
- Consolidating masking schemes
- Higher order masking of look-up tables
- Consolidating inner product masking
- Reconciling \((d+1)\) masking in hardware and software
- Selected Areas in Cryptography
- Security evaluation against side-channel analysis at compilation time
- Detecting flawed masking schemes with leakage detection tests
- Not so difficult in the end: breaking the lookup table-based affine masking scheme
- Combining loop shuffling and code polymorphism for enhanced AES side-channel security
- Multi-variate high-order attacks of shuffled tables recomputation
- Cryptanalysis of masked ciphers: a not so random idea
This page was built for publication: Masking tables -- an underestimated security risk
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946889)