Vectorizing Higher-Order Masking
From MaRDI portal
Publication:3297549
DOI10.1007/978-3-319-89641-0_2zbMath1450.94034OpenAlexW2795224205MaRDI QIDQ3297549
Ko Stoffelen, Kostas Papagiannopoulos, Peter Schwabe, Benjamin Grégoire
Publication date: 20 July 2020
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-89641-0_2
Related Items (3)
Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Fast verification of masking schemes in characteristic two ⋮ Custom instruction support for modular defense against side-channel and fault attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Masking proofs are tight and how to exploit it in security evaluations
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Towards easy leakage certification
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- All the AES you need on Cortex-M3 and M4
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON
- Soft Analytical Side-Channel Attacks
- Higher-Order Side Channel Security and Mask Refreshing
- Making Masking Security Proofs Concrete
- Verified Proofs of Higher-Order Masking
- The World Is Not Enough: Another Look on Second-Order DPA
- Improving Differential Power Analysis by Elastic Alignment
- A Fast and Provably Secure Higher-Order Masking of AES S-Box
- A Very Compact “Perfectly Masked” S-Box for AES
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Faster and Timing-Attack Resistant AES-GCM
- Bitsliced Masking and ARM: Friends or Foes?
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- Very High Order Masking: Efficient Implementation and Security Evaluation
- How to Certify the Leakage of a Chip?
- Advances in Cryptology - CRYPTO 2003
- A Fast and Cache-Timing Resistant Implementation of the AES
- Rectangular Confidence Regions for the Means of Multivariate Normal Distributions
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- How Fast Can Higher-Order Masking Be in Software?
This page was built for publication: Vectorizing Higher-Order Masking