scientific article; zbMATH DE number 1418308

From MaRDI portal
Publication:4941870

zbMath0942.68045MaRDI QIDQ4941870

No author found.

Publication date: 27 August 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended versionHow to fool a black box machine learning based side-channel security evaluationA First-Order Leak-Free Masking CountermeasureTowards tight random probing securityResilient uniformity: applying resiliency in maskingCorrelation power analysis and higher-order masking implementation of WAGEDifferential power analysis of stream ciphers with LFSRsSecurity analysis of deterministic re-keying with masking and shuffling: application to ISAP\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionSide-channel attacks countermeasure based on decomposed S-boxes for KuznyechikSecure GCM implementation on AVRHigher-Order Side Channel Security and Mask RefreshingMasking Tables—An Underestimated Security RiskHigher-Order Glitch Resistant Implementation of the PRESENT S-BoxUnifying Leakage Classes: Simulatable Leakage and PseudoentropyRevisiting mutual information analysis: multidimensionality, neural estimation and optimality proofsMasking and leakage-resilient primitives: one, the other(s) or both?Effective and efficient masking with low noise using small-Mersenne-prime ciphersOne-hot conversion: towards faster table-based A2B conversionA further study on bridge structures and constructing bijective S-boxes for low-latency maskingSpin me right round rotational symmetry for FPGA-specific AES: extended versionProvable secure software masking in the real-worldSystematic study of decryption and re-encryption leakage: the case of KyberHandcrafting: improving automated masking in hardware with manual optimizationsRemoving the field size loss from Duc et al.'s conjectured bound for masked encodingsFast first-order masked NTTRURecovering secrets from prefix-dependent leakageTransNet: shift invariant transformer network for side channel analysisA Very Compact “Perfectly Masked” S-Box for AESTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsUnknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRFA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotGeneralized probabilistic satisfiability and applications to modelling attackers with side-channel capabilitiesHigher-order masking scheme for Trivium hardware implementationHigher-order masked SaberProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelDivided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacksDynamic random probing expansion with quasi linear asymptotic complexityAnalyzing masked ciphers against transition and coupling effectsDomain-oriented masked bit-parallel finite-field multiplier against side-channel attacksEfficiently masking polynomial inversion at arbitrary order\textsf{ISAP+}: \textsf{ISAP} with fast authenticationBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsUnifying freedom and separation for tight probing-secure compositionBeyond birthday bound secure fresh rekeying: application to authenticated encryptionSILVER -- statistical independence and leakage verificationCryptanalysis of masked ciphers: a not so random ideaPacked multiplication: how to amortize the cost of side-channel masking?Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block CiphersUnifying leakage models: from probing attacks to noisy leakageMutual information analysis: a comprehensive studySecure hardware implementation of nonlinear functions in the presence of glitchesSide-channel resistant crypto for less than 2,300 GEReducing Randomness Complexity of Mask Refreshing AlgorithmSecure Multiplication for Bitslice Higher-Order Masking: Optimisation and ComparisonVectorizing Higher-Order MaskingThreshold Implementation in SoftwareDetecting Flawed Masking Schemes with Leakage Detection TestsMontgomery’s Trick and Fast Implementation of Masked AESRedefining the transparency orderImproving the security and efficiency of block ciphers based on LS-designsMultivariate high-order attacks of shuffled tables recomputationParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelHow Fast Can Higher-Order Masking Be in Software?Memory encryptionWhite-box cryptography: don't forget about grey-box attacksMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionPrivate Circuits II: Keeping Secrets in Tamperable CircuitsOn two DES implementations secure against differential power analysis in smart-cardsHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONOptimal Amplification of Noisy LeakagesPolynomial Evaluation and Side Channel AnalysisFirst-Order Differential Power Analysis on the Duplication MethodDesign of a Differential Power Analysis Resistant Masked AES S-BoxAffine Equivalence and Its Application to Tightening Threshold Implementations\textsc{Ascon} v1.2: lightweight authenticated encryption and hashingAffine Masking against Higher-Order Side Channel AnalysisRandom Order m-ary ExponentiationOn the power of expansion: more efficient constructions in the random probing modelLeakage resilient value comparison with application to message authenticationThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsLeakage resilience from program obfuscationRandom probing security: verification, composition, expansion and new constructionsMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle\textsf{Scatter}: a missing case?Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functionsOn the role of formal methods in securityHamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense