Masking Tables—An Underestimated Security Risk
From MaRDI portal
Publication:2946889
DOI10.1007/978-3-662-43933-3_22zbMath1321.94094OpenAlexW1472434837MaRDI QIDQ2946889
Elisabeth Oswald, Carolyn Whitnall, Michael Tunstall
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_22
Related Items (6)
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ SCATTER: A New Dimension in Side-Channel ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Multivariate high-order attacks of shuffled tables recomputation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings
- The World Is Not Enough: Another Look on Second-Order DPA
- Affine Masking against Higher-Order Side Channel Analysis
- Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
- A Fast and Provably Secure Higher-Order Masking of AES S-Box
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Provably Secure Higher-Order Masking of AES
- Towards sound approaches to counteract power-analysis attacks
- Generic Side-Channel Distinguishers: Improvements and Limitations
- Power Analysis Attacks
- Known-Key Distinguishers for Some Block Ciphers
- The Myth of Generic DPA…and the Magic of Learning
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- Topics in Cryptology – CT-RSA 2005
- Public Key Cryptography - PKC 2005
- Fast Software Encryption
- Topics in Cryptology – CT-RSA 2006
- Applied Cryptography and Network Security
This page was built for publication: Masking Tables—An Underestimated Security Risk