The world is not enough: another look on second-order DPA
From MaRDI portal
Publication:3058652
DOI10.1007/978-3-642-17373-8_7zbMATH Open1290.94132DBLPconf/asiacrypt/StandaertVOGMKM10OpenAlexW1838677899WikidataQ58765209 ScholiaQ58765209MaRDI QIDQ3058652FDOQ3058652
Authors: Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard, François-Xavier Standaert
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_7
Recommendations
Cited In (28)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- \textsf{Scatter}: a missing case?
- Complementing Feistel Ciphers
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Masking Tables—An Underestimated Security Risk
- Statistical properties of side-channel and fault injection attacks using coding theory
- Multivariate high-order attacks of shuffled tables recomputation
- A first-order leak-free masking countermeasure
- On Second-Order Differential Power Analysis
- A Note on the Use of Margins to Compare Distinguishers
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- Secure Implementation of Lattice-Based Encryption Schemes
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
- Affine Masking against Higher-Order Side Channel Analysis
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Topics in Cryptology – CT-RSA 2006
- Selecting time samples for multivariate DPA attacks
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Vectorizing Higher-Order Masking
- Thermodynamic aspects of confidentiality
- Unifying leakage models: from probing attacks to noisy leakage
This page was built for publication: The world is not enough: another look on second-order DPA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058652)