Pages that link to "Item:Q3583477"
From MaRDI portal
The following pages link to Provably Secure Higher-Order Masking of AES (Q3583477):
Displaying 50 items.
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- Correlation power analysis and higher-order masking implementation of WAGE (Q832394) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- The wonderful world of global random oracles (Q1648798) (← links)
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data (Q1648801) (← links)
- Masking AES with \(d+1\) shares in hardware (Q1695972) (← links)
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks (Q1698614) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Statistical properties of side-channel and fault injection attacks using coding theory (Q1749798) (← links)
- Multivariate high-order attacks of shuffled tables recomputation (Q1753166) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- Tornado: automatic generation of probing-secure masked bitsliced implementations (Q2055659) (← links)
- Side-channel masking with pseudo-random generator (Q2055660) (← links)
- On the power of expansion: more efficient constructions in the random probing model (Q2056735) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Random probing security: verification, composition, expansion and new constructions (Q2096491) (← links)
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (Q2120989) (← links)
- Secure wire shuffling in the probing model (Q2128997) (← links)
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks (Q2145289) (← links)
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} (Q2170090) (← links)
- KVaC: key-value commitments for blockchains and beyond (Q2691607) (← links)
- Packed multiplication: how to amortize the cost of side-channel masking? (Q2692370) (← links)
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON (Q2790039) (← links)
- Efficient Leakage Resilient Circuit Compilers (Q2790050) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Polynomial Evaluation and Side Channel Analysis (Q2803637) (← links)
- Related-Key Attack on Full-Round PICARO (Q2807197) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption (Q2820486) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Complementing Feistel Ciphers (Q2946868) (← links)
- Higher-Order Side Channel Security and Mask Refreshing (Q2946888) (← links)
- Masking Tables—An Underestimated Security Risk (Q2946889) (← links)
- Near Collision Attack on the Grain v1 Stream Cipher (Q2946894) (← links)
- Making Masking Security Proofs Concrete (Q2948337) (← links)
- Verified Proofs of Higher-Order Masking (Q2948340) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF (Q2958140) (← links)
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order (Q2975799) (← links)
- Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers (Q2975800) (← links)
- Montgomery’s Trick and Fast Implementation of Masked AES (Q3011910) (← links)
- Affine Masking against Higher-Order Side Channel Analysis (Q3084260) (← links)
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks (Q3104720) (← links)
- Security Evaluation Against Side-Channel Analysis at Compilation Time (Q3294874) (← links)
- Reducing Randomness Complexity of Mask Refreshing Algorithm (Q3297482) (← links)
- Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison (Q3297548) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- SCATTER: A New Dimension in Side-Channel (Q3297554) (← links)