Faster and Timing-Attack Resistant AES-GCM
From MaRDI portal
Publication:3642916
DOI10.1007/978-3-642-04138-9_1zbMath1290.94102OpenAlexW1523982624MaRDI QIDQ3642916
Publication date: 10 November 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04138-9_1
Related Items (22)
Logic minimization techniques with applications to cryptology ⋮ Whirlwind: a new cryptographic hash function ⋮ System-level non-interference of constant-time cryptography. I: Model ⋮ Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness ⋮ Physical attacks and beyond ⋮ All the AES you need on Cortex-M3 and M4 ⋮ Formal verification of side-channel countermeasures using self-composition ⋮ Vectorizing Higher-Order Masking ⋮ On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis ⋮ System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory ⋮ Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC ⋮ Efficient Design Strategies Based on the AES Round Function ⋮ Really Fast Syndrome-Based Hashing ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ Efficient cache attacks on AES, and countermeasures ⋮ Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES ⋮ Bitsliced High-Performance AES-ECB on GPUs ⋮ A formal analysis of prefetching in profiled cache-timing attacks on block ciphers ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ Атака по времени на CUDA-реализацию блочного шифра типа AES ⋮ On software implementation of Kuznyechik on Intel CPUs ⋮ Custom instruction support for modular defense against side-channel and fault attacks
This page was built for publication: Faster and Timing-Attack Resistant AES-GCM