Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Masking proofs are tight and how to exploit it in security evaluations

From MaRDI portal
Publication:1648843
Jump to:navigation, search

DOI10.1007/978-3-319-78375-8_13zbMath1428.94075OpenAlexW2592002982WikidataQ58764858 ScholiaQ58764858MaRDI QIDQ1648843

François-Xavier Standaert, Vincent Grosso

Publication date: 9 July 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-78375-8_13



Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (7)

On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Systematic study of decryption and re-encryption leakage: the case of Kyber ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Packed multiplication: how to amortize the cost of side-channel masking? ⋮ Vectorizing Higher-Order Masking ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version




This page was built for publication: Masking proofs are tight and how to exploit it in security evaluations

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:1648843&oldid=13959464"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 1 February 2024, at 05:16.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki