The world is not enough: another look on second-order DPA
From MaRDI portal
Publication:3058652
Recommendations
Cited in
(32)- Selecting time samples for multivariate DPA attacks
- Secure Implementation of Lattice-Based Encryption Schemes
- Topics in Cryptology – CT-RSA 2006
- Boosting higher-order correlation attacks by dimensionality reduction
- A first-order leak-free masking countermeasure
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
- Leakage squeezing of order two
- Masks will fall off. Higher-order optimal distinguishers
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Vectorizing higher-order masking
- Masking tables -- an underestimated security risk
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- There is wisdom in harnessing the strengths of your enemy: customized encoding to thwart side-channel attacks
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Unifying leakage models: from probing attacks to noisy leakage
- A statistical model for higher order DPA on masked devices
- Thermodynamic aspects of confidentiality
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- Statistical properties of side-channel and fault injection attacks using coding theory
- \textsf{Scatter}: a missing case?
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Complementing Feistel ciphers
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- Multivariate high-order attacks of shuffled tables recomputation
- On Second-Order Differential Power Analysis
- A note on the use of margins to compare distinguishers
- Affine Masking against Higher-Order Side Channel Analysis
- Masking and leakage-resilient primitives: one, the other(s) or both?
This page was built for publication: The world is not enough: another look on second-order DPA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058652)