Fast Software Encryption
From MaRDI portal
Publication:5473604
DOI10.1007/b137506zbMath1140.94366OpenAlexW4214882369WikidataQ28000487 ScholiaQ28000487MaRDI QIDQ5473604
Norbert Pramstaller, Vincent Rijmen, Elisabeth Oswald, Stefan Mangard
Publication date: 22 June 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b137506
Related Items (20)
AES side-channel countermeasure using random tower field constructions ⋮ SM4 Chaotic Masking Scheme Against Power Analysis Based on FPGA ⋮ Complementing Feistel Ciphers ⋮ Masking Tables—An Underestimated Security Risk ⋮ Threshold implementations of small S-boxes ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ A Very Compact “Perfectly Masked” S-Box for AES ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis ⋮ Threshold Implementation in Software ⋮ Montgomery’s Trick and Fast Implementation of Masked AES ⋮ Efficient cache attacks on AES, and countermeasures ⋮ Improved Side-Channel Collision Attacks on AES ⋮ Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches ⋮ First-Order Differential Power Analysis on the Duplication Method ⋮ Design of a Differential Power Analysis Resistant Masked AES S-Box ⋮ On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices ⋮ PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology
This page was built for publication: Fast Software Encryption