Masking and leakage-resilient primitives: one, the other(s) or both?
From MaRDI portal
(Redirected from Publication:892292)
Recommendations
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1504808 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Leakage-Resilient Mode of Operation
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A formal study of power variability issues and side-channel attacks for nanoscale devices
- A statistical model for DPA with novel algorithmic confusion analysis
- Advances in Cryptology - CRYPTO 2003
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings
- Advances in cryptology -- EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Algebraic side-channel attacks
- Applied Cryptography and Network Security
- Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
- Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2005. 7th international workshop, Edinburgh, UK, August 29--September 1, 2005. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings
- Fast Software Encryption
- Higher-order glitches free implementation of the AES using secure multi-party computation protocols
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Leakage-resilient symmetric encryption via re-keying
- Masking against Side-Channel Attacks: A Formal Security Proof
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Power Analysis Attacks
- Practical leakage-resilient pseudorandom objects with minimum public randomness
- Practical leakage-resilient symmetric cryptography
- Provably secure higher-order masking of AES
- Pushing the limits: a very compact and a threshold implementation of AES
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- The world is not enough: another look on second-order DPA
- Topics in Cryptology – CT-RSA 2004
- Topics in Cryptology – CT-RSA 2005
- Topics in Cryptology – CT-RSA 2006
- Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint
- Towards sound approaches to counteract power-analysis attacks
- Towards super-exponential side-channel security with efficient leakage-resilient PRFs
Cited in
(11)- Robust pseudo-random number generators with input secure against side-channel attacks
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- Leakage resilient value comparison with application to message authentication
- Towards sound fresh re-keying with hard (physical) learning problems
- Secret can be public: low-memory AEAD mode for high-order masking
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking
- Theory and practice of a leakage resilient masking scheme
This page was built for publication: Masking and leakage-resilient primitives: one, the other(s) or both?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892292)