Topics in Cryptology – CT-RSA 2006
From MaRDI portal
Publication:5898565
DOI10.1007/11605805zbMath1125.94330OpenAlexW2564556261WikidataQ56921257 ScholiaQ56921257MaRDI QIDQ5898565
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11605805
Related Items (16)
Masking Tables—An Underestimated Security Risk ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Dynamic random probing expansion with quasi linear asymptotic complexity ⋮ First-order side channel attacks on Zhang's countermeasures ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ Threshold Implementation in Software ⋮ Detecting Flawed Masking Schemes with Leakage Detection Tests ⋮ Montgomery’s Trick and Fast Implementation of Masked AES ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Efficient cache attacks on AES, and countermeasures ⋮ Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ On the implementation efficiency of linear regression-based side-channel attacks
This page was built for publication: Topics in Cryptology – CT-RSA 2006