Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers
From MaRDI portal
Publication:2975800
DOI10.1007/978-3-319-52153-4_7zbMath1383.94047OpenAlexW2569842611MaRDI QIDQ2975800
Publication date: 12 April 2017
Published in: Topics in Cryptology – CT-RSA 2017 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-52153-4_7
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Provably Secure Higher-Order Masking of AES
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Towards sound approaches to counteract power-analysis attacks
- Higher Order Masking of Look-Up Tables
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers