Analyzing masked ciphers against transition and coupling effects
From MaRDI portal
Publication:6157583
DOI10.1007/978-3-030-92518-5_10zbMATH Open1514.94075OpenAlexW3202589669MaRDI QIDQ6157583FDOQ6157583
Authors: Siemen Dhooghe
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92518-5_10
Recommendations
- Cryptanalysis of masked ciphers: a not so random idea
- Unifying leakage models: from probing attacks to noisy leakage
- Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking
- Masking against Side-Channel Attacks: A Formal Security Proof
- Topics in Cryptology – CT-RSA 2005
Cites Work
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Keccak
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- The LED block cipher
- Towards sound approaches to counteract power-analysis attacks
- The PHOTON family of lightweight hash functions
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Title not available (Why is that?)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Masking AES with \(d+1\) shares in hardware
- Block cipher invariants as eigenvectors of correlation matrices
- A first-order SCA resistant AES without fresh randomness
- SILVER -- statistical independence and leakage verification
- Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing
- Cryptanalysis of masked ciphers: a not so random idea
Cited In (1)
This page was built for publication: Analyzing masked ciphers against transition and coupling effects
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157583)