Analyzing masked ciphers against transition and coupling effects
From MaRDI portal
Publication:6157583
Recommendations
- Cryptanalysis of masked ciphers: a not so random idea
- Unifying leakage models: from probing attacks to noisy leakage
- Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking
- Masking against Side-Channel Attacks: A Formal Security Proof
- Topics in Cryptology – CT-RSA 2005
Cites work
- scientific article; zbMATH DE number 176548 (Why is no real title available?)
- scientific article; zbMATH DE number 1455107 (Why is no real title available?)
- scientific article; zbMATH DE number 1504808 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A first-order SCA resistant AES without fresh randomness
- Advances in Cryptology - CRYPTO 2003
- Block cipher invariants as eigenvectors of correlation matrices
- Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing
- Cryptanalysis of masked ciphers: a not so random idea
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Keccak
- Masking AES with \(d+1\) shares in hardware
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- SILVER -- statistical independence and leakage verification
- The LED block cipher
- The PHOTON family of lightweight hash functions
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Towards sound approaches to counteract power-analysis attacks
This page was built for publication: Analyzing masked ciphers against transition and coupling effects
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157583)