Higher Order Masking of Look-Up Tables

From MaRDI portal
Publication:5418710

DOI10.1007/978-3-642-55220-5_25zbMath1326.94082OpenAlexW1847989447MaRDI QIDQ5418710

Jean-Sébastien Coron

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_25




Related Items (22)

Secure wire shuffling in the probing modelCorrelation power analysis and higher-order masking implementation of WAGEConsolidating Masking Schemes\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}Threshold implementations of small S-boxesProvable secure software masking in the real-worldTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelTime-Memory Trade-Offs for Side-Channel Resistant Implementations of Block CiphersDetecting Flawed Masking Schemes with Leakage Detection TestsThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksStatistical properties of side-channel and fault injection attacks using coding theoryMultivariate high-order attacks of shuffled tables recomputationHow Fast Can Higher-Order Masking Be in Software?Codes for Side-Channel Attacks and ProtectionsMasking the GLP lattice-based signature scheme at any orderHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONUnconditionally secure computation against low-complexity leakagePolynomial Evaluation and Side Channel AnalysisCorrection to: ``Unconditionally secure computation against low-complexity leakageOn the power of expansion: more efficient constructions in the random probing modelA VLSI implementation of an SM4 algorithm resistant to power analysis




This page was built for publication: Higher Order Masking of Look-Up Tables