Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
From MaRDI portal
Publication:2958137
DOI10.1007/978-3-662-53887-6_21zbMath1404.94046OpenAlexW2553306305MaRDI QIDQ2958137
Olivier Rioul, Yannick Teglia, Annelie Heuser, Nicolas Bruneau, Sylvain Guilley, François-Xavier Standaert
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_21
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptographic hardware and embedded systems -- CHES 2015. 17th international workshop, Saint-Malo, France, September 13--16, 2015. Proceedings
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Less is more: dimensionality reduction from a theoretical perspective
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Multi-variate high-order attacks of shuffled tables recomputation
- Statistical Tools Flavor Side-Channel Collision Attacks
- Masks Will Fall Off
- Masking Tables—An Underestimated Security Risk
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
- Making Masking Security Proofs Concrete
- The World Is Not Enough: Another Look on Second-Order DPA
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Statistical Analysis of Second Order Differential Power Analysis
- Power Analysis Attacks
- A Statistical Model for Higher Order DPA on Masked Devices
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Template Attacks on Masking—Resistance Is Futile
- Higher Order Masking of Look-Up Tables
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Applied Cryptography and Network Security