Leakage squeezing: optimal implementation and security evaluation
DOI10.1515/JMC-2012-0018zbMATH Open1372.94414OpenAlexW2035391051MaRDI QIDQ742019FDOQ742019
Authors: Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
Publication date: 17 September 2014
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2012-0018
Recommendations
- Optimal First-Order Masking with Linear and Non-linear Bijections
- Leakage squeezing of order two
- A first-order leak-free masking countermeasure
- Higher-order masking schemes for S-boxes
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
first-order masking countermeasure (CM)Hamming distance/Hamming weight leakage modelshigh-order correlation power analysis (HO-CPA)leakage squeezinglinear and non-linear codeszero-offset HO-CPA
Cited In (6)
- Statistical properties of side-channel and fault injection attacks using coding theory
- Leakage squeezing using cellular automata
- Leakage squeezing of order two
- Codes for side-channel attacks and protections
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Leakage squeezing using cellular automata and its application to scan attack
This page was built for publication: Leakage squeezing: optimal implementation and security evaluation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q742019)