There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
From MaRDI portal
Publication:4639480
DOI10.1007/978-3-662-52993-5_12zbMath1387.94093OpenAlexW2487967864MaRDI QIDQ4639480
Julien Bringer, Houssem Maghrebi, Victor Servant
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_12
side-channel analysissecurity metricsstochastic characterizationconstant weight countermeasurescustomized encoding functioninformation theoretic analysis
Related Items (2)
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme ⋮ On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Behind the Scene of Side Channel Attacks
- Making Masking Security Proofs Concrete
- The World Is Not Enough: Another Look on Second-Order DPA
- A White-Box DES Implementation for DRM Applications
- PRESENT: An Ultra-Lightweight Block Cipher
- Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Differential Cluster Analysis
- Mutual Information Analysis: How, When and Why?
- Statistical Analysis of Second Order Differential Power Analysis
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Higher Order Masking of Look-Up Tables
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks