scientific article; zbMATH DE number 1418308
From MaRDI portal
Publication:4941870
zbMath0942.68045MaRDI QIDQ4941870
No author found.
Publication date: 27 August 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ How to fool a black box machine learning based side-channel security evaluation ⋮ A First-Order Leak-Free Masking Countermeasure ⋮ Towards tight random probing security ⋮ Resilient uniformity: applying resiliency in masking ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ Differential power analysis of stream ciphers with LFSRs ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik ⋮ Secure GCM implementation on AVR ⋮ Higher-Order Side Channel Security and Mask Refreshing ⋮ Masking Tables—An Underestimated Security Risk ⋮ Higher-Order Glitch Resistant Implementation of the PRESENT S-Box ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ One-hot conversion: towards faster table-based A2B conversion ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Provable secure software masking in the real-world ⋮ Systematic study of decryption and re-encryption leakage: the case of Kyber ⋮ Handcrafting: improving automated masking in hardware with manual optimizations ⋮ Removing the field size loss from Duc et al.'s conjectured bound for masked encodings ⋮ Fast first-order masked NTTRU ⋮ Recovering secrets from prefix-dependent leakage ⋮ TransNet: shift invariant transformer network for side channel analysis ⋮ A Very Compact “Perfectly Masked” S-Box for AES ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities ⋮ Higher-order masking scheme for Trivium hardware implementation ⋮ Higher-order masked Saber ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks ⋮ Dynamic random probing expansion with quasi linear asymptotic complexity ⋮ Analyzing masked ciphers against transition and coupling effects ⋮ Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks ⋮ Efficiently masking polynomial inversion at arbitrary order ⋮ \textsf{ISAP+}: \textsf{ISAP} with fast authentication ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Unifying freedom and separation for tight probing-secure composition ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ SILVER -- statistical independence and leakage verification ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ Packed multiplication: how to amortize the cost of side-channel masking? ⋮ Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Mutual information analysis: a comprehensive study ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ Reducing Randomness Complexity of Mask Refreshing Algorithm ⋮ Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison ⋮ Vectorizing Higher-Order Masking ⋮ Threshold Implementation in Software ⋮ Detecting Flawed Masking Schemes with Leakage Detection Tests ⋮ Montgomery’s Trick and Fast Implementation of Masked AES ⋮ Redefining the transparency order ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ Memory encryption ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Private Circuits II: Keeping Secrets in Tamperable Circuits ⋮ On two DES implementations secure against differential power analysis in smart-cards ⋮ Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON ⋮ Optimal Amplification of Noisy Leakages ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ First-Order Differential Power Analysis on the Duplication Method ⋮ Design of a Differential Power Analysis Resistant Masked AES S-Box ⋮ Affine Equivalence and Its Application to Tightening Threshold Implementations ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Random Order m-ary Exponentiation ⋮ On the power of expansion: more efficient constructions in the random probing model ⋮ Leakage resilient value comparison with application to message authentication ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ Leakage resilience from program obfuscation ⋮ Random probing security: verification, composition, expansion and new constructions ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ \textsf{Scatter}: a missing case? ⋮ Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions ⋮ On the role of formal methods in security ⋮ Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense