Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428136
Recommendations
Cited in
(only showing first 100 items - show all)- Threshold implementations of small S-boxes
- On the local leakage resilience of linear secret sharing schemes
- A Leakage-Resilient Mode of Operation
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A modular approach to the incompressibility of block-cipher-based AEADs
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
- Locally decodable and updatable non-malleable codes and their applications
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Montgomery’s Trick and Fast Implementation of Masked AES
- Custom instruction support for modular defense against side-channel and fault attacks
- Correlation power analysis and higher-order masking implementation of WAGE
- The geometry of provable security: some proofs of security in which lattices make a surprise appearance
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Another step towards realizing random oracles: non-malleable point obfuscation
- Leakage-Resilient Coin Tossing
- How to Compute in the Presence of Leakage
- Combined fault and leakage resilience: composability, constructions and compiler
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Weakening the isolation assumption of tamper-proof hardware tokens
- Leakage resilience of the Blom's key distribution scheme
- Tight bounds on the randomness complexity of secure multiparty computation
- Polynomial evaluation and side channel analysis
- Leakage-resilient cryptography over large finite fields: theory and practice
- Lightweight authenticated encryption mode suitable for threshold implementation
- Higher-order masking scheme for Trivium hardware implementation
- QRL: a high performance quadruple-rail logic for resisting DPA on FPGA implementations
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Efficiently testable circuits without conductivity
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Correction to: ``Unconditionally secure computation against low-complexity leakage
- Secure and efficient software masking on superscalar pipelined processors
- Statistical properties of side-channel and fault injection attacks using coding theory
- Secure wire shuffling in the probing model
- Resilient uniformity: applying resiliency in masking
- Deterministic Public-Key Encryption Under Continual Leakage
- Higher-order side channel security and mask refreshing
- Strong continuous non-malleable encoding schemes with tamper-detection
- Masking tables -- an underestimated security risk
- How fast can higher-order masking be in software?
- Provable secure software masking in the real-world
- Efficiently masking polynomial inversion at arbitrary order
- Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
- Compositional Synthesis of Leakage Resilient Programs
- On the bit-slice representations of some nonlinear bijective transformations
- Exploiting algebraic structures in probing security
- Quantitative fault injection analysis
- Energy-Privacy Trade-Offs in VLSI Computations
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Leakage-resilient cryptography from minimal assumptions
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- The wonderful world of global random oracles
- Codes for side-channel attacks and protections
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- Proving SIFA protection of masked redundant circuits
- Interleaved Group Products
- Making the best of a leaky situation: zero-knowledge PCPs from leakage-resilient circuits
- Secure Implementation of Lattice-Based Encryption Schemes
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking
- New bounds on the local leakage resilience of Shamir's secret sharing scheme
- Learning with physical rounding for linear and quadratic leakage functions
- Universal hashing based on field multiplication and (near-)MDS matrices
- Unifying freedom and separation for tight probing-secure composition
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- A low-randomness second-order masked AES
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Leakage-resilient key exchange and two-seed extractors
- Security evaluation against side-channel analysis at compilation time
- Leakage resilient one-way functions: the auxiliary-input setting
- Detecting flawed masking schemes with leakage detection tests
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- A first-order SCA resistant AES without fresh randomness
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Mask compression: high-order masking on memory-constrained devices
- Threshold implementations with non-uniform inputs
- The random fault model
- Non-Malleable Codes from Additive Combinatorics
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Unifying leakage classes: simulatable leakage and pseudoentropy
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- A holistic approach towards side-channel secure fixed-weight polynomial sampling
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Vectorizing higher-order masking
- CAPABARA: a combined attack on CAPA
- Lightweight leakage-resilient PRNG from TBCs using superposition
- Masking the GLP lattice-based signature scheme at any order
- Leakage-resilient signatures
- Public-key encryption schemes with auxiliary inputs
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
- Private circuits with quasilinear randomness
- On the connection between leakage tolerance and adaptive security
- Fault template attacks on block ciphers exploiting fault propagation
- Side-channel masking with pseudo-random generator
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Dummy shuffling against algebraic attacks in white-box implementations
- Fast verification of masking schemes in characteristic two
- Leakage resilient value comparison with application to message authentication
This page was built for publication: Advances in Cryptology - CRYPTO 2003
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5428136)