Differential power analysis of the Picnic signature scheme
From MaRDI portal
Publication:2118537
DOI10.1007/978-3-030-81293-5_10zbMath1485.94139OpenAlexW3013381209MaRDI QIDQ2118537
Thomas Eisenbarth, Tim Gellersen, Okan Şeker
Publication date: 22 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81293-5_10
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Distributed systems (68M14) Authentication, digital signatures and secret sharing (94A62)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- BBQ: using AES in Picnic signatures
- Grafting trees: a fault attack against the SPHINCS framework
- Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation
- Differential computation analysis: hiding your white-box designs is not enough
- Security of hedged Fiat-Shamir signatures under fault attacks
- Efficient cache attacks on AES, and countermeasures
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Ciphers for MPC and FHE
- Faster Hash-Based Signatures with Bounded Leakage
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Unbalanced Oil and Vinegar Signature Schemes
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- Power Analysis Attacks
This page was built for publication: Differential power analysis of the Picnic signature scheme