Detecting Flawed Masking Schemes with Leakage Detection Tests
From MaRDI portal
Publication:4639478
DOI10.1007/978-3-662-52993-5_11zbMath1387.94098OpenAlexW2495307099MaRDI QIDQ4639478
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/536710
differential power analysisleakage detectiondifferential power analysis attacksecurity claimsimulated trace
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Secure key generation from biased PUFs
- A masked ring-LWE implementation
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- Higher-Order Threshold Implementations
- Higher-Order Side Channel Security and Mask Refreshing
- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box
- Verified Proofs of Higher-Order Masking
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Consolidating Masking Schemes
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Provably Secure Higher-Order Masking of AES
- Theory and Practice of a Leakage Resilient Masking Scheme
- Towards sound approaches to counteract power-analysis attacks
- THE PROBABLE ERROR OF A MEAN
- On the Practical Security of a Leakage Resilient Masking Scheme
- Higher Order Masking of Look-Up Tables
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Detecting Flawed Masking Schemes with Leakage Detection Tests