scientific article; zbMATH DE number 1504808
From MaRDI portal
Publication:4502779
zbMath0955.94011MaRDI QIDQ4502779
Publication date: 4 March 2001
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (35)
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ A First-Order Leak-Free Masking Countermeasure ⋮ Resilient uniformity: applying resiliency in masking ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Boosting Higher-Order Correlation Attacks by Dimensionality Reduction ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Provable secure software masking in the real-world ⋮ Removing the field size loss from Duc et al.'s conjectured bound for masked encodings ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Dynamic random probing expansion with quasi linear asymptotic complexity ⋮ Analyzing masked ciphers against transition and coupling effects ⋮ Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks ⋮ \textsf{ISAP+}: \textsf{ISAP} with fast authentication ⋮ Unifying freedom and separation for tight probing-secure composition ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme ⋮ An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Mutual information analysis: a comprehensive study ⋮ Vectorizing Higher-Order Masking ⋮ Detecting Flawed Masking Schemes with Leakage Detection Tests ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Private Circuits II: Keeping Secrets in Tamperable Circuits ⋮ On two DES implementations secure against differential power analysis in smart-cards ⋮ First-Order Differential Power Analysis on the Duplication Method ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ On the power of expansion: more efficient constructions in the random probing model ⋮ Leakage resilient value comparison with application to message authentication ⋮ Random probing security: verification, composition, expansion and new constructions ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ \textsf{Scatter}: a missing case? ⋮ Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense
This page was built for publication: