Topics in Cryptology – CT-RSA 2004

From MaRDI portal
Publication:5901697

DOI10.1007/b95630zbMath1196.94059OpenAlexW2500040996MaRDI QIDQ5901697

Stefan Mangard

Publication date: 7 May 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b95630




Related Items (18)

How to fool a black box machine learning based side-channel security evaluationScore-Based vs. Probability-Based Enumeration – A Cautionary NoteSecurity analysis of deterministic re-keying with masking and shuffling: application to ISAPOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesMasking and leakage-resilient primitives: one, the other(s) or both?Effective and efficient masking with low noise using small-Mersenne-prime ciphersToward reverse engineering on secret \(S\)-boxes in block ciphersProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelLearning with physical rounding for linear and quadratic leakage functionsThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksRedefining the transparency orderMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionImproving DPA by Peak Distribution AnalysisMultivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic ApplicationsOn the Exact Success Rate of Side Channel Analysis in the Gaussian ModelMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleA template attack to reconstruct the input of SHA-3 on an 8-bit device\textsf{Scatter}: a missing case?




This page was built for publication: Topics in Cryptology – CT-RSA 2004