Pages that link to "Item:Q2096492"
From MaRDI portal
The following pages link to Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492):
Displaying 16 items.
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- A stealthy hardware Trojan based on a statistical fault attack (Q2120995) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- (Q4536671) (← links)
- Systematic study of decryption and re-encryption leakage: the case of Kyber (Q6086403) (← links)
- Efficient leakage-resilient MACs without idealized assumptions (Q6157513) (← links)
- Compactly committing authenticated encryption using encryptment and tweakable block cipher (Q6620046) (← links)
- On the security of triplex- and multiplex-type constructions with smaller tweaks (Q6623292) (← links)
- Lightweight leakage-resilient PRNG from TBCs using superposition (Q6630419) (← links)
- Generalized Feistel ciphers for efficient prime field masking (Q6637329) (← links)
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking (Q6637529) (← links)
- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences (Q6652998) (← links)
- \textsf{LR-OT}: leakage-resilient oblivious transfer (Q6660389) (← links)