Pages that link to "Item:Q2948337"
From MaRDI portal
The following pages link to Making Masking Security Proofs Concrete (Q2948337):
Displaying 16 items.
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Fast verification of masking schemes in characteristic two (Q2056733) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- How to fool a black box machine learning based side-channel security evaluation (Q2120993) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations (Q2958136) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Ridge-Based Profiled Differential Power Analysis (Q2975816) (← links)
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note (Q3179482) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks (Q4639480) (← links)
- Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration (Q4975181) (← links)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889) (← links)
- Codes for Side-Channel Attacks and Protections (Q5739021) (← links)