Hardware implementation and side-channel analysis of Lapin
From MaRDI portal
Publication:5404753
DOI10.1007/978-3-319-04852-9_11zbMATH Open1337.94096OpenAlexW1769884570WikidataQ58765043 ScholiaQ58765043MaRDI QIDQ5404753FDOQ5404753
Authors: Lubos Gaspar, Gaëtan Leurent, François-Xavier Standaert
Publication date: 28 March 2014
Published in: Topics in Cryptology – CT-RSA 2014 (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-00934054/file/lapin2.pdf
Recommendations
Cited In (5)
- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
- Leakage-resilient cryptography over large finite fields: theory and practice
- Learning with physical rounding for linear and quadratic leakage functions
- Towards sound fresh re-keying with hard (physical) learning problems
- Efficient authentication from hard learning problems
This page was built for publication: Hardware implementation and side-channel analysis of Lapin
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404753)