The World Is Not Enough: Another Look on Second-Order DPA

From MaRDI portal
Publication:3058652


DOI10.1007/978-3-642-17373-8_7zbMath1290.94132OpenAlexW1838677899WikidataQ58765209 ScholiaQ58765209MaRDI QIDQ3058652

Markus Kasper, Nicolas Veyrat-Charvillon, Stefan Mangard, Elisabeth Oswald, Marcel Medwed, Benedikt Gierlichs, François-Xavier Standaert

Publication date: 7 December 2010

Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_7



Related Items

A First-Order Leak-Free Masking Countermeasure, Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data, Thermodynamic aspects of confidentiality, Complementing Feistel Ciphers, Masking Tables—An Underestimated Security Risk, Masking and leakage-resilient primitives: one, the other(s) or both?, Effective and efficient masking with low noise using small-Mersenne-prime ciphers, Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations, Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF, Secure Implementation of Lattice-Based Encryption Schemes, Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Unifying leakage models: from probing attacks to noisy leakage, Mutual information analysis: a comprehensive study, Secure hardware implementation of nonlinear functions in the presence of glitches, Vectorizing Higher-Order Masking, There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks, Statistical properties of side-channel and fault injection attacks using coding theory, Multivariate high-order attacks of shuffled tables recomputation, Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version, A Note on the Use of Margins to Compare Distinguishers, Affine Masking against Higher-Order Side Channel Analysis, \textsf{Scatter}: a missing case?