Applied Cryptography and Network Security
From MaRDI portal
Publication:5899220
DOI10.1007/11767480zbMath1151.94517OpenAlexW4211109874MaRDI QIDQ5899220
Elisabeth Oswald, Christoph Herbst, Stefan Mangard
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11767480
Related Items (15)
Secure wire shuffling in the probing model ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis ⋮ Attacks and Security Proofs of EAX-Prime ⋮ Masking Tables—An Underestimated Security Risk ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Improved Side-Channel Collision Attacks on AES ⋮ Dummy shuffling against algebraic attacks in white-box implementations ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ \textsf{Scatter}: a missing case?
This page was built for publication: Applied Cryptography and Network Security