Selected Areas in Cryptography
From MaRDI portal
Publication:5491740
DOI10.1007/b105103zbMath1117.94312OpenAlexW2490793069MaRDI QIDQ5491740
Johannes Blömer, Volker Krummel, Jorge Guajardo
Publication date: 10 October 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b105103
Related Items (16)
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ AES side-channel countermeasure using random tower field constructions ⋮ Threshold implementations of small S-boxes ⋮ A Very Compact “Perfectly Masked” S-Box for AES ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ Montgomery’s Trick and Fast Implementation of Masked AES ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Codes for Side-Channel Attacks and Protections ⋮ Analysis of Countermeasures Against Access Driven Cache Attacks on AES ⋮ Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches ⋮ Design of a Differential Power Analysis Resistant Masked AES S-Box
This page was built for publication: Selected Areas in Cryptography