Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
From MaRDI portal
Publication:3612378
DOI10.1007/978-3-540-72738-5_10zbMath1214.68155OpenAlexW1589364525MaRDI QIDQ3612378
Christoph Herbst, Stefan Tillich, Stefan Mangard
Publication date: 10 March 2009
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-72738-5_10
DPApower analysisside-channel attacksadvanced encryption standardimplementation securityinstruction set extensionssoftware countermeasures
Related Items (4)
Secure wire shuffling in the probing model ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Dummy shuffling against algebraic attacks in white-box implementations ⋮ Improved see-in-the-middle attacks on AES
This page was built for publication: Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis