Side Channel Cryptanalysis of a Higher Order Masking Scheme
From MaRDI portal
Publication:3525056
DOI10.1007/978-3-540-74735-2_3zbMath1300.94048OpenAlexW2155861318MaRDI QIDQ3525056
Matthieu Rivain, Emmanuel Prouff, Jean-Sébastien Coron
Publication date: 16 September 2008
Published in: Cryptographic Hardware and Embedded Systems - CHES 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74735-2_3
Related Items
Masking and leakage-resilient primitives: one, the other(s) or both?, A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not, Security Evaluation Against Side-Channel Analysis at Compilation Time, Threshold Implementation in Software, Detecting Flawed Masking Schemes with Leakage Detection Tests, Montgomery’s Trick and Fast Implementation of Masked AES, Multivariate high-order attacks of shuffled tables recomputation, Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version, Affine Masking against Higher-Order Side Channel Analysis, Tornado: automatic generation of probing-secure masked bitsliced implementations