From random probing to noisy leakages without field-size dependence
From MaRDI portal
Publication:6637530
DOI10.1007/978-3-031-58737-5_13MaRDI QIDQ6637530
Gianluca Brian, Sebastian Faust, Stefan Dziembowski
Publication date: 13 November 2024
Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40)
Cites Work
- Title not available (Why is that?)
- Private circuits: a modular approach
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- How to securely compute with noisy leakage in quasilinear complexity
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Side-channel masking with pseudo-random generator
- On the power of expansion: more efficient constructions in the random probing model
- Towards tight random probing security
- Unifying leakage models on a Rényi day
- Noisy Leakage Revisited
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Indistinguishability Amplification
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Secure computation with information leaking to an adversary
- Advances in Cryptology - CRYPTO 2003
- Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate
- Dynamic random probing expansion with quasi linear asymptotic complexity
Related Items (1)
This page was built for publication: From random probing to noisy leakages without field-size dependence
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6637530)