Pages that link to "Item:Q1715856"
From MaRDI portal
The following pages link to Unifying leakage models: from probing attacks to noisy leakage (Q1715856):
Displaying 14 items.
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- How to securely compute with noisy leakage in quasilinear complexity (Q1710615) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Augmenting leakage detection using bootstrapping (Q2106688) (← links)
- Towards tight random probing security (Q2128995) (← links)
- A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks (Q2795979) (← links)
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests (Q2867238) (← links)
- Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis (Q2985425) (← links)
- Analyzing masked ciphers against transition and coupling effects (Q6157583) (← links)
- Mask compression: high-order masking on memory-constrained devices (Q6620034) (← links)
- Leakage-tolerant circuits (Q6637525) (← links)
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing (Q6652995) (← links)
- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences (Q6652998) (← links)