Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers

From MaRDI portal
Publication:2975800
Jump to:navigation, search

DOI10.1007/978-3-319-52153-4_7zbMath1383.94047OpenAlexW2569842611MaRDI QIDQ2975800

Praveen Kumar Vadnala

Publication date: 12 April 2017

Published in: Topics in Cryptology – CT-RSA 2017 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-52153-4_7


zbMATH Keywords

maskingside-channel attackstime-memory trade-offAES-128S-box compression


Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (1)

Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik




Cites Work

  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
  • Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
  • Provably Secure Higher-Order Masking of AES
  • Conversion of Security Proofs from One Leakage Model to Another: A New Issue
  • Towards sound approaches to counteract power-analysis attacks
  • Higher Order Masking of Look-Up Tables
  • Topics in Cryptology – CT-RSA 2006




This page was built for publication: Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2975800&oldid=15981408"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 3 February 2024, at 20:20.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki