Consolidating Masking Schemes
From MaRDI portal
Publication:3457138
DOI10.1007/978-3-662-47989-6_37zbMath1375.94156OpenAlexW2219812381MaRDI QIDQ3457138
Ingrid Verbauwhede, Svetla Nikova, Oscar Reparaz, Benedikt Gierlichs, Begül Bilgin
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/511053
Related Items (29)
How to fool a black box machine learning based side-channel security evaluation ⋮ Resilient uniformity: applying resiliency in masking ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ The wonderful world of global random oracles ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ Secret can be public: low-memory AEAD mode for high-order masking ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Higher-order masking scheme for Trivium hardware implementation ⋮ Secure and efficient software masking on superscalar pipelined processors ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks ⋮ A lightweight implementation of Saber resistant against side-channel attacks ⋮ Improving first-order threshold implementations of \textsf{SKINNY} ⋮ Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Uniform first-order threshold implementations ⋮ Succinct Diophantine-satisfiability arguments ⋮ SILVER -- statistical independence and leakage verification ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order ⋮ Hiding Higher-Order Side-Channel Leakage ⋮ Reducing Randomness Complexity of Mask Refreshing Algorithm ⋮ On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis ⋮ Protecting Triple-DES Against DPA ⋮ A First-Order SCA Resistant AES Without Fresh Randomness ⋮ Detecting Flawed Masking Schemes with Leakage Detection Tests ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Fault template attacks on block ciphers exploiting fault propagation ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
Cites Work
- Side-channel resistant crypto for less than 2,300 GE
- Threshold implementations of small S-boxes
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Provably Secure Higher-Order Masking of AES
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
- Selecting Time Samples for Multivariate DPA Attacks
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- A More Efficient AES Threshold Implementation
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Higher Order Masking of Look-Up Tables
This page was built for publication: Consolidating Masking Schemes