Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
From MaRDI portal
Publication:2975801
DOI10.1007/978-3-319-52153-4_8zbMATH Open1383.94042OpenAlexW2567810792MaRDI QIDQ2975801FDOQ2975801
Authors: Pascal Sasdrich, Amir Moradi, Tim Güneysu
Publication date: 12 April 2017
Published in: Topics in Cryptology – CT-RSA 2017 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-52153-4_8
Recommendations
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Higher-Order Threshold Implementations
- Affine equivalence and its application to tightening threshold implementations
- Resilient uniformity: applying resiliency in masking
- A first-order leak-free masking countermeasure
Cites Work
- Comprehensive evaluation of AES dual ciphers as a side-channel countermeasure
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Power Analysis Attacks
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Side-channel resistant crypto for less than 2,300 GE
- A white-box DES implementation for DRM applications
- Consolidating masking schemes
- Title not available (Why is that?)
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Uniform first-order threshold implementations
- Higher-Order Threshold Implementations
- White-box security notions for symmetric encryption schemes
- Affine equivalence and its application to tightening threshold implementations
Cited In (3)
Uses Software
This page was built for publication: Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2975801)