Unifying freedom and separation for tight probing-secure composition
From MaRDI portal
Publication:6186765
Recommendations
Cites work
- scientific article; zbMATH DE number 1504808 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Circuit compilers with \(O(1/\log (n))\) leakage rate
- Fast verification of masking schemes in characteristic two
- Hardware Private Circuits: From Trivial Composition to Full Verification
- Higher-order side channel security and mask refreshing
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- How to securely compute with noisy leakage in quasilinear complexity
- Masking against Side-Channel Attacks: A Formal Security Proof
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Private multiplication over finite fields
- Provably secure higher-order masking of AES
- Random probing security: verification, composition, expansion and new constructions
- Randomness complexity of private circuits for multiplication
- SILVER -- statistical independence and leakage verification
- Secure wire shuffling in the probing model
- Theory of Cryptography
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Tight private circuits: achieving probing security with the least refreshing
- Towards sound approaches to counteract power-analysis attacks
- Unifying leakage models: from probing attacks to noisy leakage.
- Verified Proofs of Higher-Order Masking
This page was built for publication: Unifying freedom and separation for tight probing-secure composition
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186765)