Side-channel resistant crypto for less than 2,300 GE
From MaRDI portal
(Redirected from Publication:656520)
Recommendations
Cites work
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 2172796 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
- Applied Cryptography and Network Security
- Authenticating Pervasive Devices with Human Protocols
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- DPA Leakage Models for CMOS Logic Circuits
- Fast Software Encryption
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- How to share a secret
- New Lightweight DES Variants
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- PRESENT: An Ultra-Lightweight Block Cipher
- Power Analysis Attacks
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Towards sound approaches to counteract power-analysis attacks
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
- Vectorial Boolean functions for cryptography
Cited in
(37)- How fast can higher-order masking be in software?
- Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials
- From substitution box to threshold
- Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks
- Arithmetic Addition over Boolean Masking
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementation in software. Case study of PRESENT
- DRECON: DPA resistant encryption by construction
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Lightweight authenticated encryption mode suitable for threshold implementation
- Uniform first-order threshold implementations
- Decomposition of permutations in a finite field
- Threshold implementations of small S-boxes
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- Fault template attacks on block ciphers exploiting fault propagation
- Affine equivalence and its application to tightening threshold implementations
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
- On the security of RSM -- presenting 5 first -- and second-order attacks
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- SILVER -- statistical independence and leakage verification
- Side channel analysis of SPARX-64/128: cryptanalysis and countermeasures
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Algebraic decomposition for probing security
- Learn from your faults: leakage assessment in fault attacks using deep learning
- Fresh re-keying: security against side-channel and fault attacks for low-cost devices
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Advanced Encryption Standard – AES
- Consolidating masking schemes
- Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Complementing Feistel ciphers
- Improving first-order threshold implementations of \textsf{SKINNY}
- Succinct Diophantine-satisfiability arguments
- FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
This page was built for publication: Side-channel resistant crypto for less than 2,300 GE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q656520)