Masking and leakage-resilient primitives: one, the other(s) or both?
DOI10.1007/S12095-014-0113-6zbMATH Open1365.94401DBLPjournals/ccds/BelaidGS15OpenAlexW2118432793WikidataQ58765004 ScholiaQ58765004MaRDI QIDQ892292FDOQ892292
Authors: Sonia Belaïd, Vincent Grosso, François-Xavier Standaert
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0113-6
Recommendations
side-channel attacksleakage-resiliencepseudorandom number generators and functionssecurity evaluations
Cites Work
- Title not available (Why is that?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Leakage-Resilient Mode of Operation
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Practical leakage-resilient symmetric cryptography
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings
- Higher-order glitches free implementation of the AES using secure multi-party computation protocols
- Fast Software Encryption
- The world is not enough: another look on second-order DPA
- Power Analysis Attacks
- Topics in Cryptology – CT-RSA 2006
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Towards sound approaches to counteract power-analysis attacks
- Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings
- Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
- Provably secure higher-order masking of AES
- A statistical model for DPA with novel algorithmic confusion analysis
- Topics in Cryptology – CT-RSA 2004
- Advances in cryptology -- EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2005
- Applied Cryptography and Network Security
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Practical leakage-resilient pseudorandom objects with minimum public randomness
- Pushing the limits: a very compact and a threshold implementation of AES
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- Leakage-resilient symmetric encryption via re-keying
- A formal study of power variability issues and side-channel attacks for nanoscale devices
- Algebraic side-channel attacks
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Towards super-exponential side-channel security with efficient leakage-resilient PRFs
- Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
- Masking against Side-Channel Attacks: A Formal Security Proof
- Cryptographic hardware and embedded systems -- CHES 2005. 7th international workshop, Edinburgh, UK, August 29--September 1, 2005. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings
Cited In (8)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Secret can be public: low-memory AEAD mode for high-order masking
- Theory and practice of a leakage resilient masking scheme
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
This page was built for publication: Masking and leakage-resilient primitives: one, the other(s) or both?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892292)