On the practical security of a leakage resilient masking scheme
From MaRDI portal
Publication:5404751
Recommendations
Cited in
(11)- High-resolution EM attacks against leakage-resilient PRFs explained and an improved construction
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Polynomial evaluation and side channel analysis
- Leakage-resilient cryptography over large finite fields: theory and practice
- Novel leakage against realistic masking and shuffling countermeasures -- case study on PRINCE and SEED
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Masking proofs are tight and how to exploit it in security evaluations
- Detecting flawed masking schemes with leakage detection tests
- On the computational soundness of cryptographically masked flows
- Making Masking Security Proofs Concrete
- A Leakage Resilient MAC
This page was built for publication: On the practical security of a leakage resilient masking scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404751)