scientific article; zbMATH DE number 1878336
From MaRDI portal
Publication:4797801
zbMath1006.68705MaRDI QIDQ4797801
Christophe Mourtel, Francis Olivier, Karine Gandolfi
Publication date: 9 March 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2162/21620251.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99)
Related Items (52)
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor ⋮ Localized Electromagnetic Analysis of Cryptographic Implementations ⋮ Towards tight random probing security ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage ⋮ Survey of information security ⋮ Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes ⋮ Design methodology and validity verification for a reactive countermeasure against EM attacks ⋮ Acoustic cryptanalysis ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Enabling cloud storage auditing with key-exposure resilience under continual key-leakage ⋮ Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis ⋮ Horizontal collision correlation attack on elliptic curves ⋮ A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model ⋮ A key-recovery attack against Mitaka in the \(t\)-probing model ⋮ Fault Attacks on Public Key Elements: Application to DLP-Based Schemes ⋮ Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities ⋮ On the exact relationship between the mutual information metric and the success rate metric ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Succinct Diophantine-satisfiability arguments ⋮ SILVER -- statistical independence and leakage verification ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Unnamed Item ⋮ A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks ⋮ Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA ⋮ Mutual information analysis: a comprehensive study ⋮ Vectorizing Higher-Order Masking ⋮ Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Private Circuits II: Keeping Secrets in Tamperable Circuits ⋮ A Probing Attack on AES ⋮ On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Susceptibility of UHF RFID Tags to Electromagnetic Analysis ⋮ A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks ⋮ A Leakage-Resilient Mode of Operation ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Random Order m-ary Exponentiation ⋮ Exponent Recoding and Regular Exponentiation Algorithms ⋮ On the Exact Success Rate of Side Channel Analysis in the Gaussian Model ⋮ Leakage Resilient Strong Key-Insulated Signatures in Public Channel ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ Leakage-Resilient Signatures ⋮ Strongly leakage resilient authenticated key exchange, revisited ⋮ RSA key recovery from digit equivalence information ⋮ Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense ⋮ Differential power analysis of the Picnic signature scheme
This page was built for publication: