Consolidating Masking Schemes

From MaRDI portal
Publication:3457138

DOI10.1007/978-3-662-47989-6_37zbMath1375.94156OpenAlexW2219812381MaRDI QIDQ3457138

Ingrid Verbauwhede, Svetla Nikova, Oscar Reparaz, Benedikt Gierlichs, Begül Bilgin

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://lirias.kuleuven.be/handle/123456789/511053




Related Items (29)

How to fool a black box machine learning based side-channel security evaluationResilient uniformity: applying resiliency in maskingCorrelation power analysis and higher-order masking implementation of WAGEThe wonderful world of global random oraclesSpin me right round rotational symmetry for FPGA-specific AES: extended versionEnergy consumption of protected cryptographic hardware cores. An experimental studySecret can be public: low-memory AEAD mode for high-order maskingA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotHigher-order masking scheme for Trivium hardware implementationSecure and efficient software masking on superscalar pipelined processorsDivided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacksA lightweight implementation of Saber resistant against side-channel attacksImproving first-order threshold implementations of \textsf{SKINNY}Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacksBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsUniform first-order threshold implementationsSuccinct Diophantine-satisfiability argumentsSILVER -- statistical independence and leakage verificationCryptanalysis of masked ciphers: a not so random ideaAn Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderHiding Higher-Order Side-Channel LeakageReducing Randomness Complexity of Mask Refreshing AlgorithmOn Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel AnalysisProtecting Triple-DES Against DPAA First-Order SCA Resistant AES Without Fresh RandomnessDetecting Flawed Masking Schemes with Leakage Detection TestsParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelFault template attacks on block ciphers exploiting fault propagationParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks




Cites Work




This page was built for publication: Consolidating Masking Schemes