Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам
From MaRDI portal
Publication:5152388
DOI10.4213/mvk143zbMath1475.94137OpenAlexW2791281892MaRDI QIDQ5152388
Publication date: 20 September 2021
Published in: Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] (Search for Journal in Brave)
Full work available at URL: http://mathnet.ru/eng/mvk143
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Examining smart-card security under the threat of power analysis attacks
- Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
- A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
This page was built for publication: Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам