Conversion of Security Proofs from One Leakage Model to Another: A New Issue
暂无分享,去创建一个
Jean-Sébastien Coron | Christophe Giraud | Emmanuel Prouff | Soline Renner | Matthieu Rivain | Praveen Kumar Vadnala | J. Coron | E. Prouff | Matthieu Rivain | Christophe Giraud | S. Renner
[1] Michaël Quisquater,et al. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings , 2011, CHES.
[2] Stefan Mangard,et al. Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010, CHES.
[3] Thomas S. Messerges,et al. Securing the AES Finalists Against Power Analysis Attacks , 2000, FSE.
[4] Elisabeth Oswald,et al. An Efficient Masking Scheme for AES Software Implementations , 2005, WISA.
[5] Emmanuel Prouff,et al. Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis , 2008, FSE.
[6] David Pointcheval. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings , 2006, CT-RSA.
[7] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[8] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[9] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[10] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[11] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[12] François-Xavier Standaert,et al. Univariate side channel attacks and leakage modeling , 2011, Journal of Cryptographic Engineering.
[13] Stefan Mangard,et al. Secure and Efficient Masking of AES - A Mission Impossible? , 2004, IACR Cryptol. ePrint Arch..
[14] Emmanuel Prouff,et al. A Generic Method for Secure SBox Implementation , 2007, WISA.
[15] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[16] Christof Paar,et al. Higher Order Masking of the AES , 2006, CT-RSA.
[17] Eric Peeters,et al. Power and electromagnetic analysis: Improved model, consequences and comparisons , 2007, Integr..
[18] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[19] Emmanuel Prouff,et al. Statistical Analysis of Second Order Differential Power Analysis , 2009, IEEE Transactions on Computers.
[20] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[21] Johannes Blömer,et al. Provably Secure Masking of AES , 2004, IACR Cryptol. ePrint Arch..
[22] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[23] Emmanuel Prouff,et al. Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols , 2011, CHES.