Hiding Higher-Order Side-Channel Leakage
From MaRDI portal
Publication:2975801
DOI10.1007/978-3-319-52153-4_8zbMath1383.94042OpenAlexW2567810792MaRDI QIDQ2975801
Tim Güneysu, Amir Moradi, Pascal Sasdrich
Publication date: 12 April 2017
Published in: Topics in Cryptology – CT-RSA 2017 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-52153-4_8
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Uniform first-order threshold implementations
- Affine Equivalence and Its Application to Tightening Threshold Implementations
- Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
- Higher-Order Threshold Implementations
- White-Box Security Notions for Symmetric Encryption Schemes
- A White-Box DES Implementation for DRM Applications
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Consolidating Masking Schemes
- PRESENT: An Ultra-Lightweight Block Cipher
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Power Analysis Attacks
This page was built for publication: Hiding Higher-Order Side-Channel Leakage