scientific article; zbMATH DE number 1504808

From MaRDI portal
Publication:4502779

zbMath0955.94011MaRDI QIDQ4502779

Louis Goubin, Jacques Patarin

Publication date: 4 March 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (35)

Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended versionA First-Order Leak-Free Masking CountermeasureResilient uniformity: applying resiliency in masking\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionBoosting Higher-Order Correlation Attacks by Dimensionality ReductionMasking and leakage-resilient primitives: one, the other(s) or both?Effective and efficient masking with low noise using small-Mersenne-prime ciphersProvable secure software masking in the real-worldRemoving the field size loss from Duc et al.'s conjectured bound for masked encodingsProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelDynamic random probing expansion with quasi linear asymptotic complexityAnalyzing masked ciphers against transition and coupling effectsDomain-oriented masked bit-parallel finite-field multiplier against side-channel attacks\textsf{ISAP+}: \textsf{ISAP} with fast authenticationUnifying freedom and separation for tight probing-secure compositionCryptanalysis of masked ciphers: a not so random ideaFeeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding SchemeAn Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderUnifying leakage models: from probing attacks to noisy leakageMutual information analysis: a comprehensive studyVectorizing Higher-Order MaskingDetecting Flawed Masking Schemes with Leakage Detection TestsMultivariate high-order attacks of shuffled tables recomputationWhite-box cryptography: don't forget about grey-box attacksPrivate Circuits II: Keeping Secrets in Tamperable CircuitsOn two DES implementations secure against differential power analysis in smart-cardsFirst-Order Differential Power Analysis on the Duplication Method\textsc{Ascon} v1.2: lightweight authenticated encryption and hashingAffine Masking against Higher-Order Side Channel AnalysisOn the power of expansion: more efficient constructions in the random probing modelLeakage resilient value comparison with application to message authenticationRandom probing security: verification, composition, expansion and new constructionsMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle\textsf{Scatter}: a missing case?Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense




This page was built for publication: