Conversion of Security Proofs from One Leakage Model to Another: A New Issue
From MaRDI portal
Publication:4905044
DOI10.1007/978-3-642-29912-4_6zbMath1352.94032OpenAlexW130128522MaRDI QIDQ4905044
Praveen Kumar Vadnala, Matthieu Rivain, Emmanuel Prouff, Christophe Giraud, Soline Renner, Jean-Sébastien Coron
Publication date: 14 February 2013
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: http://orbilu.uni.lu/handle/10993/10586
Related Items (15)
Consolidating Masking Schemes ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Provable secure software masking in the real-world ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ Secure and efficient software masking on superscalar pipelined processors ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers ⋮ Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: Conversion of Security Proofs from One Leakage Model to Another: A New Issue