Higher-order masking scheme for Trivium hardware implementation
From MaRDI portal
Publication:6134029
DOI10.1007/978-3-031-26553-2_18OpenAlexW4321353912MaRDI QIDQ6134029FDOQ6134029
Dongdai Lin, Bohan Li, Hai-Long Zhang
Publication date: 21 August 2023
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-26553-2_18
performance evaluationside-channel attacksTriviumglitch-extended probing modelhigher-order masking scheme
Cites Work
- Trivium
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
- Towards sound approaches to counteract power-analysis attacks
- An Efficient Method for Random Delay Generation in Embedded Software
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Topics in Cryptology – CT-RSA 2005
- Consolidating Masking Schemes
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Differential Power Analysis of Stream Ciphers
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Title not available (Why is that?)
- A key-recovery attack on 855-round Trivium
- The MILP-aided conditional differential attack and its application to Trivium
Cited In (1)
This page was built for publication: Higher-order masking scheme for Trivium hardware implementation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134029)