Pages that link to "Item:Q1648843"
From MaRDI portal
The following pages link to Masking proofs are tight and how to exploit it in security evaluations (Q1648843):
Displaying 16 items.
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme (Q1695964) (← links)
- Tight private circuits: achieving probing security with the least refreshing (Q1710603) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- Tornado: automatic generation of probing-secure masked bitsliced implementations (Q2055659) (← links)
- Fast verification of masking schemes in characteristic two (Q2056733) (← links)
- On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029) (← links)
- Packed multiplication: how to amortize the cost of side-channel masking? (Q2692370) (← links)
- Making Masking Security Proofs Concrete (Q2948337) (← links)
- Verified Proofs of Higher-Order Masking (Q2948340) (← links)
- On the computational soundness of cryptographically masked flows (Q3189852) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- Masking against Side-Channel Attacks: A Formal Security Proof (Q4924408) (← links)
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers (Q6061536) (← links)
- Systematic study of decryption and re-encryption leakage: the case of Kyber (Q6086403) (← links)
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking (Q6637529) (← links)
- Leakage certification made simple (Q6652997) (← links)