scientific article; zbMATH DE number 1759297
From MaRDI portal
Publication:4536229
zbMath0998.94538MaRDI QIDQ4536229
Publication date: 28 November 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (27)
Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces ⋮ Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage ⋮ Power attacks on a side-channel resistant elliptic curve implementation ⋮ Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ Higher-Order Glitch Resistant Implementation of the PRESENT S-Box ⋮ Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs ⋮ Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks ⋮ Toward reverse engineering on secret \(S\)-boxes in block ciphers ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Higher-order masking scheme for Trivium hardware implementation ⋮ Higher-order masked Saber ⋮ First-order side channel attacks on Zhang's countermeasures ⋮ Polar differential power attacks and evaluation ⋮ Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers ⋮ Mutual information analysis: a comprehensive study ⋮ SCATTER: A New Dimension in Side-Channel ⋮ Montgomery’s Trick and Fast Implementation of Masked AES ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ On two DES implementations secure against differential power analysis in smart-cards ⋮ Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions ⋮ Affine Masking against Higher-Order Side Channel Analysis
This page was built for publication: