Topics in Cryptology – CT-RSA 2006
From MaRDI portal
Publication:5898565
DOI10.1007/11605805zbMATH Open1125.94330DBLPconf/ctrsa/2006OpenAlexW2564556261MaRDI QIDQ5898565FDOQ5898565
Authors: Kai Schramm, Christof Paar
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11605805
Recommendations
- Provably secure higher-order masking of AES
- Attack on a higher-order masking of the AES based on homographic functions
- A secure against high order DPA attacks AES coprocessor based on masking scheme
- Higher-order masking in practice: a vector implementation of masked AES for ARM NEON
- Higher-order masking schemes for S-boxes
Cited In (28)
- Detecting Flawed Masking Schemes with Leakage Detection Tests
- Information Security and Cryptology - ICISC 2005
- Montgomery’s Trick and Fast Implementation of Masked AES
- On the implementation efficiency of linear regression-based side-channel attacks
- Efficient cache attacks on AES, and countermeasures
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Provably secure higher-order masking of AES
- Attack on a higher-order masking of the AES based on homographic functions
- Masking Tables—An Underestimated Security Risk
- Threshold Implementation in Software
- Masking AES with \(d+1\) shares in hardware
- Higher-order masking schemes for S-boxes
- Statistical properties of side-channel and fault injection attacks using coding theory
- Multivariate high-order attacks of shuffled tables recomputation
- First-order side channel attacks on Zhang's countermeasures
- Polynomial Evaluation and Side Channel Analysis
- Fast Software Encryption
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Affine Masking against Higher-Order Side Channel Analysis
- Not so difficult in the end: breaking the lookup table-based affine masking scheme
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Masking and leakage-resilient primitives: one, the other(s) or both?
- A secure against high order DPA attacks AES coprocessor based on masking scheme
- Dynamic random probing expansion with quasi linear asymptotic complexity
- Title not available (Why is that?)
- Security Evaluation Against Side-Channel Analysis at Compilation Time
- A fast and provably secure higher-order masking of AES S-box
- Secure hardware implementation of nonlinear functions in the presence of glitches
This page was built for publication: Topics in Cryptology – CT-RSA 2006
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898565)