Topics in Cryptology – CT-RSA 2004
From MaRDI portal
Publication:5901697
DOI10.1007/b95630zbMath1196.94059OpenAlexW2500040996MaRDI QIDQ5901697
Publication date: 7 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95630
Related Items (18)
How to fool a black box machine learning based side-channel security evaluation ⋮ Score-Based vs. Probability-Based Enumeration – A Cautionary Note ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Toward reverse engineering on secret \(S\)-boxes in block ciphers ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Redefining the transparency order ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Improving DPA by Peak Distribution Analysis ⋮ Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications ⋮ On the Exact Success Rate of Side Channel Analysis in the Gaussian Model ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ A template attack to reconstruct the input of SHA-3 on an 8-bit device ⋮ \textsf{Scatter}: a missing case?
This page was built for publication: Topics in Cryptology – CT-RSA 2004