Pages that link to "Item:Q4941870"
From MaRDI portal
The following pages link to Towards sound approaches to counteract power-analysis attacks (Q4941870):
Displayed 50 items.
- Redefining the transparency order (Q510458) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Secure hardware implementation of nonlinear functions in the presence of glitches (Q656517) (← links)
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- Correlation power analysis and higher-order masking implementation of WAGE (Q832394) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- On the role of formal methods in security (Q1607104) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Multivariate high-order attacks of shuffled tables recomputation (Q1753166) (← links)
- White-box cryptography: don't forget about grey-box attacks (Q2010584) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- On the power of expansion: more efficient constructions in the random probing model (Q2056735) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Random probing security: verification, composition, expansion and new constructions (Q2096491) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- \textsf{Scatter}: a missing case? (Q2106687) (← links)
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions (Q2106709) (← links)
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (Q2120989) (← links)
- How to fool a black box machine learning based side-channel security evaluation (Q2120993) (← links)
- Towards tight random probing security (Q2128995) (← links)
- Resilient uniformity: applying resiliency in masking (Q2130025) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- Spin me right round rotational symmetry for FPGA-specific AES: extended version (Q2188965) (← links)
- Recovering secrets from prefix-dependent leakage (Q2191199) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Secure GCM implementation on AVR (Q2413216) (← links)
- Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities (Q2424888) (← links)
- On two DES implementations secure against differential power analysis in smart-cards (Q2500477) (← links)
- Differential power analysis of stream ciphers with LFSRs (Q2629409) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- SILVER -- statistical independence and leakage verification (Q2692368) (← links)
- Cryptanalysis of masked ciphers: a not so random idea (Q2692369) (← links)
- Packed multiplication: how to amortize the cost of side-channel masking? (Q2692370) (← links)
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON (Q2790039) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Polynomial Evaluation and Side Channel Analysis (Q2803637) (← links)
- Affine Equivalence and Its Application to Tightening Threshold Implementations (Q2807212) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Higher-Order Side Channel Security and Mask Refreshing (Q2946888) (← links)
- Masking Tables—An Underestimated Security Risk (Q2946889) (← links)
- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box (Q2947102) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF (Q2958140) (← links)