Stateless leakage resiliency from NLFSRs
暂无分享,去创建一个
[1] François-Xavier Standaert,et al. Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices , 2010, AFRICACRYPT.
[2] Patrick Schaumont,et al. Side-channel countermeasure for SHA-3 at almost-zero area overhead , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[3] Debdeep Mukhopadhyay,et al. LFSR Based Stream Ciphers Are Vulnerable to Power Attacks , 2007, INDOCRYPT.
[4] Christophe De Cannière,et al. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.
[5] Antoine Joux,et al. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs , 2012, CHES.
[6] Florian Mendel,et al. Side-Channel Analysis of Keymill , 2017, COSADE.
[7] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[8] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[9] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[10] Elena Dubrova,et al. A List of Maximum Period NLFSRs , 2012, IACR Cryptol. ePrint Arch..
[11] François-Xavier Standaert,et al. Masking and leakage-resilient primitives: One, the other(s) or both? , 2015, Cryptography and Communications.
[12] Stefan Mangard,et al. Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability , 2016, CT-RSA.
[13] Tim Güneysu,et al. Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs , 2015, COSADE.
[14] Abdulah Abdulah Zadeh,et al. Simple power analysis applied to nonlinear feedback shift registers , 2014, IET Inf. Secur..
[15] Megan Wachs,et al. Gate-Level Masking under a Path-Based Leakage Metric , 2014, CHES.
[16] Ch. Aravind Kumar,et al. Key Updating for Leakage Resiliency with Application to AES Modes of Operation , 2016 .
[17] Jason Smith,et al. The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[18] Tim Güneysu,et al. Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware , 2015, ACNS.
[19] Oliver Kniffler,et al. ACHTERBAHN-128/80 , 2006 .
[20] Patrick Schaumont,et al. Keymill: Side-Channel Resilient Key Generator , 2016, IACR Cryptol. ePrint Arch..
[21] Kenneth H. Rosen,et al. Discrete Mathematics and its applications , 2000 .
[22] Stefan Mangard,et al. Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis , 2014, Journal of Cryptographic Engineering.
[23] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.