scientific article; zbMATH DE number 1878336

From MaRDI portal
Publication:4797801

zbMath1006.68705MaRDI QIDQ4797801

Christophe Mourtel, Francis Olivier, Karine Gandolfi

Publication date: 9 March 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2162/21620251.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (52)

Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser SensorLocalized Electromagnetic Analysis of Cryptographic ImplementationsTowards tight random probing securityCorrelation power analysis and higher-order masking implementation of WAGEEfficient and secure big data storage system with leakage resilience in cloud computingSignature schemes secure against hard-to-invert leakageProtecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stageSurvey of information securityEnabling 3-Share Threshold Implementations for all 4-Bit S-BoxesDesign methodology and validity verification for a reactive countermeasure against EM attacksAcoustic cryptanalysisPublic key encryption resilient to leakage and tampering attacksStrong authenticated key exchange with auxiliary inputsPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksEnabling cloud storage auditing with key-exposure resilience under continual key-leakageCryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power AnalysisHorizontal collision correlation attack on elliptic curvesA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelA key-recovery attack against Mitaka in the \(t\)-probing modelFault Attacks on Public Key Elements: Application to DLP-Based SchemesGeneralized probabilistic satisfiability and applications to modelling attackers with side-channel capabilitiesOn the exact relationship between the mutual information metric and the success rate metricProvably secure certificate-based encryption with leakage resilienceSuccinct Diophantine-satisfiability argumentsSILVER -- statistical independence and leakage verificationA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingUnnamed ItemA Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel AttacksGlitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGAMutual information analysis: a comprehensive studyVectorizing Higher-Order MaskingCryptanalysis of a Chaotic Block Cryptographic System Against Template AttacksLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsLeakage-resilient group signature: definitions and constructionsPrivate Circuits II: Keeping Secrets in Tamperable CircuitsA Probing Attack on AESOn the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel ResistanceOn hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitivesSusceptibility of UHF RFID Tags to Electromagnetic AnalysisA Unified Framework for the Analysis of Side-Channel Key Recovery AttacksA Leakage-Resilient Mode of OperationEfficient Completely Non-Malleable and RKA Secure Public Key EncryptionsRandom Order m-ary ExponentiationExponent Recoding and Regular Exponentiation AlgorithmsOn the Exact Success Rate of Side Channel Analysis in the Gaussian ModelLeakage Resilient Strong Key-Insulated Signatures in Public ChannelFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksLeakage-Resilient SignaturesStrongly leakage resilient authenticated key exchange, revisitedRSA key recovery from digit equivalence informationHamming Weight Attacks on Cryptographic Hardware — Breaking Masking DefenseDifferential power analysis of the Picnic signature scheme




This page was built for publication: