Protecting AES with Shamir's secret sharing scheme
From MaRDI portal
Publication:3172966
Recommendations
Cited in
(6)- Combined fault and leakage resilience: composability, constructions and compiler
- High-order masking by using coding theory and its application to AES
- Polynomial evaluation and side channel analysis
- Masking AES with \(d+1\) shares in hardware
- scientific article; zbMATH DE number 5041297 (Why is no real title available?)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
This page was built for publication: Protecting AES with Shamir's secret sharing scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172966)