Higher-order masking scheme for Trivium hardware implementation
From MaRDI portal
Publication:6134029
Cites work
- scientific article; zbMATH DE number 1759296 (Why is no real title available?)
- scientific article; zbMATH DE number 1759297 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A key-recovery attack on 855-round Trivium
- Advances in Cryptology - CRYPTO 2003
- An Efficient Method for Random Delay Generation in Embedded Software
- Consolidating masking schemes
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Differential Power Analysis of Stream Ciphers
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- The MILP-aided conditional differential attack and its application to Trivium
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Topics in Cryptology – CT-RSA 2005
- Towards sound approaches to counteract power-analysis attacks
- Trivium
This page was built for publication: Higher-order masking scheme for Trivium hardware implementation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134029)