Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
From MaRDI portal
Publication:2958140
DOI10.1007/978-3-662-53887-6_22zbMath1404.94096OpenAlexW2555917385WikidataQ58764970 ScholiaQ58764970MaRDI QIDQ2958140
Ventzislav Nikov, Martin Feldhofer, Marcel Medwed, François-Xavier Standaert
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_22
Related Items (1)
Cites Work
- Unnamed Item
- Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Leakage-Resilient Symmetric Encryption via Re-keying
- Higher-Order Threshold Implementations
- Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- The World Is Not Enough: Another Look on Second-Order DPA
- Affine Masking against Higher-Order Side Channel Analysis
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Provably Secure Higher-Order Masking of AES
- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
- Practical Leakage-Resilient Symmetric Cryptography
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Towards sound approaches to counteract power-analysis attacks
- A More Efficient AES Threshold Implementation
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
- Theory of Cryptography
This page was built for publication: Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF