Fast Software Encryption
From MaRDI portal
Publication:5473604
DOI10.1007/B137506zbMATH Open1140.94366OpenAlexW4214882369MaRDI QIDQ5473604FDOQ5473604
Authors: Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen
Publication date: 22 June 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b137506
Recommendations
Cited In (33)
- Threshold implementations of small S-boxes
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
- Montgomery’s Trick and Fast Implementation of Masked AES
- SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA
- On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices
- Cryptographic properties of modified AES-like S-boxes
- Efficient cache attacks on AES, and countermeasures
- Design of a Differential Power Analysis Resistant Masked AES S-Box
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Title not available (Why is that?)
- Pushing the limits: a very compact and a threshold implementation of AES
- Masking tables -- an underestimated security risk
- The schedulability of AES as a countermeasure against side channel attacks
- Wire-tap codes as side-channel countermeasure
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Improved Side-Channel Collision Attacks on AES
- Impact of S-boxes size upon side channel resistance and block cipher design
- Efficient masked S-boxes processing -- a step forward
- A Very Compact “Perfectly Masked” S-Box for AES
- A first-order SCA resistant AES without fresh randomness
- Masking and leakage-resilient primitives: one, the other(s) or both?
- PKDPA: An enhanced probabilistic differential power attack methodology
- Advanced Encryption Standard – AES
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
- Side-channel resistant crypto for less than 2,300 GE
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- AES side-channel countermeasure using random tower field constructions
- Spin me right round rotational symmetry for FPGA-specific AES: extended version
- Complementing Feistel ciphers
- First-Order Differential Power Analysis on the Duplication Method
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Threshold implementation in software. Case study of PRESENT
- Unifying leakage models: from probing attacks to noisy leakage
This page was built for publication: Fast Software Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5473604)