Pages that link to "Item:Q1695964"
From MaRDI portal
The following pages link to Horizontal side-channel attacks and countermeasures on the ISW masking scheme (Q1695964):
Displaying 27 items.
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- Tornado: automatic generation of probing-secure masked bitsliced implementations (Q2055659) (← links)
- On the power of expansion: more efficient constructions in the random probing model (Q2056735) (← links)
- Random probing security: verification, composition, expansion and new constructions (Q2096491) (← links)
- Custom instruction support for modular defense against side-channel and fault attacks (Q2106699) (← links)
- Towards tight random probing security (Q2128995) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- Packed multiplication: how to amortize the cost of side-channel masking? (Q2692370) (← links)
- Security Evaluation Against Side-Channel Analysis at Compilation Time (Q3294874) (← links)
- Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison (Q3297548) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам (Q5152388) (← links)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889) (← links)
- Unconditionally secure computation against low-complexity leakage (Q5918097) (← links)
- Correction to: ``Unconditionally secure computation against low-complexity leakage'' (Q5925544) (← links)
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers (Q6061536) (← links)
- Dynamic random probing expansion with quasi linear asymptotic complexity (Q6157515) (← links)
- Exploiting algebraic structures in probing security (Q6604876) (← links)
- Generalized Feistel ciphers for efficient prime field masking (Q6637329) (← links)
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking (Q6637529) (← links)
- From random probing to noisy leakages without field-size dependence (Q6637530) (← links)
- \textsf{Plover}: masking-friendly hash-and-sign lattice signatures (Q6637727) (← links)
- Raccoon: a masking-friendly signature proven in the probing model (Q6648199) (← links)
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing (Q6652995) (← links)