Topics in Cryptology – CT-RSA 2006
From MaRDI portal
Publication:5898565
DOI10.1007/11605805zbMATH Open1125.94330DBLPconf/ctrsa/2006OpenAlexW2564556261MaRDI QIDQ5898565FDOQ5898565
Authors: Kai Schramm, Christof Paar
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11605805
Recommendations
- Provably secure higher-order masking of AES
- Attack on a higher-order masking of the AES based on homographic functions
- A secure against high order DPA attacks AES coprocessor based on masking scheme
- Higher-order masking in practice: a vector implementation of masked AES for ARM NEON
- Higher-order masking schemes for S-boxes
Cited In (36)
- Information Security and Cryptology - ICISC 2005
- Montgomery’s Trick and Fast Implementation of Masked AES
- On the implementation efficiency of linear regression-based side-channel attacks
- Efficient cache attacks on AES, and countermeasures
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Provably secure higher-order masking of AES
- High-order masking by using coding theory and its application to AES
- Polynomial evaluation and side channel analysis
- Attack on a higher-order masking of the AES based on homographic functions
- Masking AES with \(d+1\) shares in hardware
- Higher-order masking schemes for S-boxes
- Statistical properties of side-channel and fault injection attacks using coding theory
- Higher-order side channel security and mask refreshing
- Multivariate high-order attacks of shuffled tables recomputation
- How fast can higher-order masking be in software?
- First-order side channel attacks on Zhang's countermeasures
- Masks will fall off. Higher-order optimal distinguishers
- Masking tables -- an underestimated security risk
- Fast Software Encryption
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Security evaluation against side-channel analysis at compilation time
- Detecting flawed masking schemes with leakage detection tests
- Affine Masking against Higher-Order Side Channel Analysis
- Not so difficult in the end: breaking the lookup table-based affine masking scheme
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Vectorizing higher-order masking
- A secure against high order DPA attacks AES coprocessor based on masking scheme
- Dynamic random probing expansion with quasi linear asymptotic complexity
- Title not available (Why is that?)
- A fast and provably secure higher-order masking of AES S-box
- Analysis and improvements of the DPA contest v4 implementation
- Higher-order masking in practice: a vector implementation of masked AES for ARM NEON
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementation in software. Case study of PRESENT
This page was built for publication: Topics in Cryptology – CT-RSA 2006
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898565)