The world is not enough: another look on second-order DPA
From MaRDI portal
Publication:3058652
DOI10.1007/978-3-642-17373-8_7zbMATH Open1290.94132DBLPconf/asiacrypt/StandaertVOGMKM10OpenAlexW1838677899WikidataQ58765209 ScholiaQ58765209MaRDI QIDQ3058652FDOQ3058652
Authors: Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard, François-Xavier Standaert
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_7
Recommendations
Cited In (32)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- \textsf{Scatter}: a missing case?
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Boosting higher-order correlation attacks by dimensionality reduction
- A note on the use of margins to compare distinguishers
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- There is wisdom in harnessing the strengths of your enemy: customized encoding to thwart side-channel attacks
- Statistical properties of side-channel and fault injection attacks using coding theory
- Multivariate high-order attacks of shuffled tables recomputation
- A first-order leak-free masking countermeasure
- Leakage squeezing of order two
- Masks will fall off. Higher-order optimal distinguishers
- Masking tables -- an underestimated security risk
- A statistical model for higher order DPA on masked devices
- On Second-Order Differential Power Analysis
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- Secure Implementation of Lattice-Based Encryption Schemes
- Affine Masking against Higher-Order Side Channel Analysis
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- Vectorizing higher-order masking
- Topics in Cryptology – CT-RSA 2006
- Selecting time samples for multivariate DPA attacks
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
- Complementing Feistel ciphers
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Thermodynamic aspects of confidentiality
- Unifying leakage models: from probing attacks to noisy leakage
This page was built for publication: The world is not enough: another look on second-order DPA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058652)