AES side-channel countermeasure using random tower field constructions
From MaRDI portal
Publication:369425
DOI10.1007/s10623-012-9670-xzbMath1347.94021OpenAlexW2042634050MaRDI QIDQ369425
Pierre Liardet, Alexandre Venelli, Alexis Bonnecaze
Publication date: 24 September 2013
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-012-9670-x
Cites Work
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Montgomery’s Trick and Fast Implementation of Masked AES
- Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
- A Very Compact “Perfectly Masked” S-Box for AES
- A Very Compact S-Box for AES
- Secure Multiplicative Masking of Power Functions
- Mixed Bases for Efficient Inversion in ${{\mathbb F}{((2^2)^2)}{2}}$ and Conversion Matrices of SubBytes of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Fast Software Encryption
- Selected Areas in Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: AES side-channel countermeasure using random tower field constructions