Side-channel attacks on threshold implementations using a glitch algebra
From MaRDI portal
Recommendations
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Higher-Order Threshold Implementations
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
- A more efficient AES threshold implementation
- Enabling 3-share threshold implementations for all 4-bit S-boxes
Cited in
(2)
This page was built for publication: Side-channel attacks on threshold implementations using a glitch algebra
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1801192)