Algebraic Decomposition for Probing Security
From MaRDI portal
Publication:3457137
DOI10.1007/978-3-662-47989-6_36zbMath1375.94108OpenAlexW2262841793MaRDI QIDQ3457137
Emmanuel Prouff, Matthieu Rivain, Claude Carlet, Thomas Roche
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_36
Related Items (10)
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials ⋮ Decomposition of permutations in a finite field ⋮ Dynamic random probing expansion with quasi linear asymptotic complexity ⋮ On decompositions of permutation polynomials into quadratic and cubic power permutations ⋮ Uniform first-order threshold implementations ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ Tornado: automatic generation of probing-secure masked bitsliced implementations
Cites Work
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- Threshold implementations of small S-boxes
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
- A Fast and Provably Secure Higher-Order Masking of AES S-Box
- Provably Secure Higher-Order Masking of AES
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
- Higher-Order Masking Schemes for S-Boxes
- Masking against Side-Channel Attacks: A Formal Security Proof
- Efficient Masked S-Boxes Processing – A Step Forward –
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
This page was built for publication: Algebraic Decomposition for Probing Security