Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1878339 - MaRDI portal

scientific article; zbMATH DE number 1878339

From MaRDI portal
Publication:4797806

zbMath1006.68702MaRDI QIDQ4797806

Mehdi-Laurent Akkar, Christophe Giraud

Publication date: 9 March 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2162/21620309.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (26)

Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended versionA First-Order Leak-Free Masking CountermeasureCorrelation power analysis and higher-order masking implementation of WAGESide-channel attacks countermeasure based on decomposed S-boxes for KuznyechikCAR30: a new scalable stream cipher with rule 30Evolutionary ciphers against differential power analysis and differential fault analysisAES side-channel countermeasure using random tower field constructionsSM4 Chaotic Masking Scheme Against Power Analysis Based on FPGAMasking Tables—An Underestimated Security RiskThreshold implementations of small S-boxesA Very Compact “Perfectly Masked” S-Box for AESTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsEfficiently masking polynomial inversion at arbitrary orderA Five-Round Algebraic Property of the Advanced Encryption StandardSecure hardware implementation of nonlinear functions in the presence of glitchesSCATTER: A New Dimension in Side-ChannelThreshold Implementation in SoftwareA new birthday-type algorithm for attacking the fresh re-keying countermeasureMultivariate high-order attacks of shuffled tables recomputationOn two DES implementations secure against differential power analysis in smart-cardsSecure Hardware Implementation of Non-linear Functions in the Presence of GlitchesBuying AES Design Resistance with Speed and EnergyFirst-Order Differential Power Analysis on the Duplication MethodAffine Masking against Higher-Order Side Channel AnalysisPKDPA: An Enhanced Probabilistic Differential Power Attack MethodologyA VLSI implementation of an SM4 algorithm resistant to power analysis







This page was built for publication: