The following pages link to (Q4502779):
Displaying 31 items.
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Multivariate high-order attacks of shuffled tables recomputation (Q1753166) (← links)
- White-box cryptography: don't forget about grey-box attacks (Q2010584) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- On the power of expansion: more efficient constructions in the random probing model (Q2056735) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Random probing security: verification, composition, expansion and new constructions (Q2096491) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- \textsf{Scatter}: a missing case? (Q2106687) (← links)
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (Q2120989) (← links)
- Resilient uniformity: applying resiliency in masking (Q2130025) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- On two DES implementations secure against differential power analysis in smart-cards (Q2500477) (← links)
- Cryptanalysis of masked ciphers: a not so random idea (Q2692369) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction (Q2946987) (← links)
- Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Q2975798) (← links)
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order (Q2975799) (← links)
- Affine Masking against Higher-Order Side Channel Analysis (Q3084260) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- Private Circuits II: Keeping Secrets in Tamperable Circuits (Q3593103) (← links)
- Detecting Flawed Masking Schemes with Leakage Detection Tests (Q4639478) (← links)
- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense (Q5030179) (← links)
- First-Order Differential Power Analysis on the Duplication Method (Q5458211) (← links)
- Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks (Q6161456) (← links)
- Automated verification of correctness for masked arithmetic programs (Q6535686) (← links)
- The random fault model (Q6620044) (← links)
- On the security of triplex- and multiplex-type constructions with smaller tweaks (Q6623292) (← links)
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking (Q6637529) (← links)