Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
From MaRDI portal
Publication:1698614
DOI10.1007/978-3-319-69453-5_3zbMath1412.94190OpenAlexW2765174330MaRDI QIDQ1698614
Neng Gao, Chenyang Tu, Zeyi Liu, Yuan Ma, Zongbin Liu
Publication date: 16 February 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-69453-5_3
side-channel analysisshufflingDPA contest V4.2first-order masking schemesnon-profiled attacksecond order CPA
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the Security of RSM - Presenting 5 First- and Second-Order Attacks
- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures
- Analysis and Improvements of the DPA Contest v4 Implementation
- The World Is Not Enough: Another Look on Second-Order DPA
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
- Complementary Dual Codes for Counter-Measures to Side-Channel Attacks
- Provably Secure Higher-Order Masking of AES
- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Statistical Analysis of Second Order Differential Power Analysis
- Detecting Hidden Leakages
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Topics in Cryptology – CT-RSA 2006
- Applied Cryptography and Network Security
This page was built for publication: Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks