Effective and efficient masking with low noise using small-Mersenne-prime ciphers
From MaRDI portal
Publication:6061536
DOI10.1007/978-3-031-30634-1_20MaRDI QIDQ6061536
Thorben Moos, Pierrick Méaux, François-Xavier Standaert, Loïc Masure
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I
- Secure hardware implementation of nonlinear functions in the presence of glitches
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Fast software encryption. 4th international workshop, FSE '97, Haifa, Israel, January 20--22, 1997. Proceedings
- Formal verification of masked hardware implementations in the presence of glitches
- Masking proofs are tight and how to exploit it in security evaluations
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On a generalization of substitution-permutation networks: the HADES design strategy
- Feistel structures for MPC, and more
- Consolidating inner product masking
- SILVER -- statistical independence and leakage verification
- Template Attacks on Different Devices
- Optimal Amplification of Noisy Leakages
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- Leakage-Resilient Circuits without Computational Assumptions
- Soft Analytical Side-Channel Attacks
- Verified Proofs of Higher-Order Masking
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
- The World Is Not Enough: Another Look on Second-Order DPA
- Affine Masking against Higher-Order Side Channel Analysis
- Vectorizing Higher-Order Masking
- Hardware Private Circuits: From Trivial Composition to Full Verification
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Shuffling Cards and Stopping Times
- The Wide Trail Design Strategy
- The cipher SHARK
- The interpolation attack on block ciphers
- A fast new DES implementation in software
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Masking against Side-Channel Attacks: A Formal Security Proof
- Fast Cryptography in Genus 2
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
- How Fast Can Higher-Order Masking Be in Software?
- Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate
- Randomness Complexity of Private Circuits for Multiplication
- Topics in Cryptology – CT-RSA 2004
- Transciphering framework for approximate homomorphic encryption