Affine Masking against Higher-Order Side Channel Analysis
From MaRDI portal
Publication:3084260
DOI10.1007/978-3-642-19574-7_18zbMath1293.94065OpenAlexW1883495059MaRDI QIDQ3084260
Matthieu Rivain, Emmanuel Prouff, Ange Martinelli, Guillaume Fumaroli
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_18
Related Items (9)
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ SoK: how (not) to design and implement post-quantum cryptography ⋮ Masking Tables—An Underestimated Security Risk ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ SCATTER: A New Dimension in Side-Channel ⋮ Threshold Implementation in Software ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Affine Masking against Higher-Order Side Channel Analysis
Cites Work
- The World Is Not Enough: Another Look on Second-Order DPA
- Affine Masking against Higher-Order Side Channel Analysis
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks
- Towards sound approaches to counteract power-analysis attacks
- Statistical Analysis of Second Order Differential Power Analysis
- Revisiting Higher-Order DPA Attacks:
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Template Attacks on Masking—Resistance Is Futile
- First-Order Differential Power Analysis on the Duplication Method
- Topics in Cryptology – CT-RSA 2006
- Topics in Cryptology – CT-RSA 2006
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Affine Masking against Higher-Order Side Channel Analysis