Search-Space Reduction for S-Boxes Resilient to Power Attacks
暂无分享,去创建一个
Ismel Martínez-Díaz | Guillermo Sosa-Gómez | Carlos Miguel Legón-Pérez | Omar Rojas | Ricardo Sánchez-Muiña | Dianne Miyares-Moreno | Yasser Bardaji-López | Guillermo Sosa-Gómez | Omar Rojas | Ismel Martínez-Díaz | Ricardo Sánchez-Muiña | Dianne Miyares-Moreno | Yasser Bardaji-López
[1] A. Adam Ding,et al. A Statistical Model for DPA with Novel Algorithmic Confusion Analysis , 2012, CHES.
[2] Claude Carlet,et al. Vectorial Boolean Functions for Cryptography , 2006 .
[3] Kaisa Nyberg,et al. On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.
[4] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[5] Kostas Papagiannopoulos,et al. Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes , 2014, INDOCRYPT.
[6] Matthew J. B. Robshaw,et al. PRINTcipher: A Block Cipher for IC-Printing , 2010, CHES.
[7] Yongbin Zhou,et al. The Notion of Transparency Order, Revisited , 2020, IACR Cryptol. ePrint Arch..
[8] Somanath Tripathy,et al. Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes , 2020, J. Hardw. Syst. Secur..
[9] Emmanuel Prouff,et al. DPA Attacks and S-Boxes , 2005, FSE.
[10] Olivier Markowitch,et al. Comparing Sboxes of ciphers from the perspective of side-channel attacks , 2016, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST).
[11] Alejandro Freyre-Echevarría,et al. Evolving Nonlinear S-Boxes With Improved Theoretical Resilience to Power Attacks , 2020, IEEE Access.
[12] Kostas Papagiannopoulos,et al. Optimality and beyond: The case of 4×4 S-boxes , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[13] Nikita Veshchikov,et al. SILK: high level of abstraction leakage simulator for side channel analysis , 2014, PPREW@ACSAC.
[14] Claude Carlet,et al. Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience , 2017, ACNS.
[15] Liwei Zhang,et al. A Statistics-based Fundamental Model for Side-channel Attack Analysis , 2014, IACR Cryptol. ePrint Arch..
[16] Alex Biryukov,et al. A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms , 2003, EUROCRYPT.
[17] Gregor Leander,et al. On the Classification of 4 Bit S-Boxes , 2007, WAIFI.
[18] Debdeep Mukhopadhyay,et al. Redefining the transparency order , 2015, Designs, Codes and Cryptography.