The World Is Not Enough: Another Look on Second-Order DPA
From MaRDI portal
Publication:3058652
DOI10.1007/978-3-642-17373-8_7zbMath1290.94132OpenAlexW1838677899WikidataQ58765209 ScholiaQ58765209MaRDI QIDQ3058652
Markus Kasper, Nicolas Veyrat-Charvillon, Stefan Mangard, Elisabeth Oswald, Marcel Medwed, Benedikt Gierlichs, François-Xavier Standaert
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_7
Related Items (24)
A First-Order Leak-Free Masking Countermeasure ⋮ Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data ⋮ Thermodynamic aspects of confidentiality ⋮ Complementing Feistel Ciphers ⋮ Masking Tables—An Underestimated Security Risk ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ Secure Implementation of Lattice-Based Encryption Schemes ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Mutual information analysis: a comprehensive study ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Vectorizing Higher-Order Masking ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ A Note on the Use of Margins to Compare Distinguishers ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ \textsf{Scatter}: a missing case?
This page was built for publication: The World Is Not Enough: Another Look on Second-Order DPA