Several Masked Implementations of the Boyar-Peralta AES S-Box
暂无分享,去创建一个
[1] Stefan Mangard,et al. Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order , 2016, IACR Cryptol. ePrint Arch..
[2] Emmanuel Prouff,et al. Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.
[3] Ingrid Verbauwhede,et al. Consolidating Masking Schemes , 2015, CRYPTO.
[4] Vincent Rijmen,et al. Higher-Order Threshold Implementations , 2014, ASIACRYPT.
[5] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[6] Syed Kareem Uddin. Trade-OFFS For Threshold Implementations Illustrated on AES , 2017 .
[7] Stefan Mangard,et al. Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.
[8] Joan Boyar,et al. A Small Depth-16 Circuit for the AES S-Box , 2012, SEC.
[9] P. Rohatgi,et al. A testing methodology for side channel resistance , 2011 .
[10] Vincent Rijmen,et al. A More Efficient AES Threshold Implementation , 2014, AFRICACRYPT.
[11] Begül Bilgin,et al. Higher-Order Threshold Implementation of the AES S-Box , 2015, CARDIS.
[12] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[13] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[14] Vincent Rijmen,et al. Threshold Implementations Against Side-Channel Attacks and Glitches , 2006, ICICS.
[15] Vincent Rijmen,et al. Efficient and First-Order DPA Resistant Implementations of Keccak , 2013, CARDIS.
[16] Begül Bilgin,et al. Threshold implementations : as countermeasure against higher-order differential power analysis , 2015 .
[17] David Canright,et al. A Very Compact S-Box for AES , 2005, CHES.
[18] Vincent Rijmen,et al. Threshold Implementations of all 3x3 and 4x4 S-boxes , 2012, IACR Cryptol. ePrint Arch..
[19] Christof Paar,et al. Pushing the Limits: A Very Compact and a Threshold Implementation of AES , 2011, EUROCRYPT.
[20] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[21] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[22] P. Rohatgi,et al. Test Vector Leakage Assessment ( TVLA ) methodology in practice , 2013 .
[23] Matthieu Rivain,et al. How Fast Can Higher-Order Masking Be in Software? , 2017, EUROCRYPT.
[24] Vincent Rijmen,et al. Does Coupling Affect the Security of Masked Implementations? , 2017, COSADE.
[25] Amir Moradi,et al. Side-Channel Resistant Crypto for Less than 2,300 GE , 2011, Journal of Cryptology.
[26] Vincent Rijmen,et al. Masking AES With d+1 Shares in Hardware , 2016, CHES.
[27] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[28] François-Xavier Standaert,et al. Very High Order Masking: Efficient Implementation and Security Evaluation , 2017, IACR Cryptol. ePrint Arch..
[29] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.