Masking and leakage-resilient primitives: one, the other(s) or both?
From MaRDI portal
Publication:892292
DOI10.1007/s12095-014-0113-6zbMath1365.94401OpenAlexW2118432793WikidataQ58765004 ScholiaQ58765004MaRDI QIDQ892292
Sonia Belaïd, François-Xavier Standaert, Vincent Grosso
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0113-6
side-channel attacksleakage-resiliencepseudorandom number generators and functionssecurity evaluations
Related Items (7)
Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ Secret can be public: low-memory AEAD mode for high-order masking ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings
- Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2005. 7th international workshop, Edinburgh, UK, August 29--September 1, 2005. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings
- Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Leakage-Resilient Symmetric Encryption via Re-keying
- Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- Algebraic Side-Channel Attacks
- The World Is Not Enough: Another Look on Second-Order DPA
- Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Leakage-Resilient Mode of Operation
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
- Practical Leakage-Resilient Symmetric Cryptography
- A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
- Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Security Evaluations beyond Computing Power
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- Power Analysis Attacks
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- Topics in Cryptology – CT-RSA 2005
- Topics in Cryptology – CT-RSA 2006
- Applied Cryptography and Network Security
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Masking and leakage-resilient primitives: one, the other(s) or both?