Higher-order masking scheme for Trivium hardware implementation
From MaRDI portal
Publication:6134029
DOI10.1007/978-3-031-26553-2_18OpenAlexW4321353912MaRDI QIDQ6134029
Dong-Dai Lin, Bohan Li, Hai-Long Zhang
Publication date: 21 August 2023
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-26553-2_18
performance evaluationside-channel attacksTriviumglitch-extended probing modelhigher-order masking scheme
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- A key-recovery attack on 855-round Trivium
- The MILP-aided conditional differential attack and its application to Trivium
- Consolidating Masking Schemes
- Trivium
- Threshold Implementations Against Side-Channel Attacks and Glitches
- An Efficient Method for Random Delay Generation in Embedded Software
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Towards sound approaches to counteract power-analysis attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Differential Power Analysis of Stream Ciphers
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Higher-order masking scheme for Trivium hardware implementation