scientific article; zbMATH DE number 1878339
From MaRDI portal
Publication:4797806
zbMath1006.68702MaRDI QIDQ4797806
Mehdi-Laurent Akkar, Christophe Giraud
Publication date: 9 March 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2162/21620309.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99)
Related Items (26)
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ A First-Order Leak-Free Masking Countermeasure ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik ⋮ CAR30: a new scalable stream cipher with rule 30 ⋮ Evolutionary ciphers against differential power analysis and differential fault analysis ⋮ AES side-channel countermeasure using random tower field constructions ⋮ SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA ⋮ Masking Tables—An Underestimated Security Risk ⋮ Threshold implementations of small S-boxes ⋮ A Very Compact “Perfectly Masked” S-Box for AES ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Efficiently masking polynomial inversion at arbitrary order ⋮ A Five-Round Algebraic Property of the Advanced Encryption Standard ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ SCATTER: A New Dimension in Side-Channel ⋮ Threshold Implementation in Software ⋮ A new birthday-type algorithm for attacking the fresh re-keying countermeasure ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ On two DES implementations secure against differential power analysis in smart-cards ⋮ Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches ⋮ Buying AES Design Resistance with Speed and Energy ⋮ First-Order Differential Power Analysis on the Duplication Method ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology ⋮ A VLSI implementation of an SM4 algorithm resistant to power analysis
This page was built for publication: