Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
From MaRDI portal
Publication:2145296
DOI10.1007/978-3-030-89915-8_8zbMath1491.94069OpenAlexW3208740725MaRDI QIDQ2145296
Olivier Bronchain, Balazs Udvarhelyi, François-Xavier Standaert
Publication date: 17 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-89915-8_8
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Soft Analytical Side-Channel Attacks
- Making Masking Security Proofs Concrete
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Practical Leakage-Resilient Symmetric Cryptography
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Keccak
- Towards sound approaches to counteract power-analysis attacks
- Advances in Cryptology - CRYPTO 2003
- Applied Cryptography and Network Security
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Security analysis of deterministic re-keying with masking and shuffling: application to ISAP