Correlation power analysis and higher-order masking implementation of WAGE
From MaRDI portal
Publication:832394
DOI10.1007/978-3-030-81652-0_23zbMATH Open1493.94032OpenAlexW3183447759MaRDI QIDQ832394FDOQ832394
Authors: Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Tianhong Xu, Yunjie Yi, Nusa Zidaric, Raghvendra Singh Rohit
Publication date: 25 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81652-0_23
Recommendations
- Hamming weight attacks on cryptographic hardware -- breaking masking defense
- How fast can higher-order masking be in software?
- Block ciphers that are easier to mask: how far can we go?
- Reconciling \((d+1)\) masking in hardware and software
- A secure against high order DPA attacks AES coprocessor based on masking scheme
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Power Analysis Attacks
- Towards sound approaches to counteract power-analysis attacks
- Provably secure higher-order masking of AES
- Fast Software Encryption
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Masking AES with \(d+1\) shares in hardware
- Faster evaluation of sboxes via common shares
- Soft analytical side-channel attacks
- Higher-order side channel security and mask refreshing
- Verified Proofs of Higher-Order Masking
- Consolidating masking schemes
- Side-channel analysis of six SHA-3 candidates
- Higher-order masking schemes for S-boxes
- Reconciling \((d+1)\) masking in hardware and software
- Higher order masking of look-up tables
Cited In (3)
This page was built for publication: Correlation power analysis and higher-order masking implementation of WAGE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832394)