On the Power of Expansion: More Efficient Constructions in the Random Probing Model
暂无分享,去创建一个
[1] Benjamin Grégoire,et al. Strong Non-Interference and Type-Directed Higher-Order Masking , 2016, CCS.
[2] Stefan Dziembowski,et al. Simple Refreshing in the Noisy Leakage Model , 2019, ASIACRYPT.
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[5] Benjamin Grégoire,et al. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations , 2019, Journal of Cryptographic Engineering.
[6] Benjamin Grégoire,et al. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model , 2017, EUROCRYPT.
[7] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[8] Rina Zeitoun,et al. Side-channel Masking with Pseudo-Random Generator , 2020, IACR Cryptol. ePrint Arch..
[9] Yuval Ishai,et al. Private Circuits: A Modular Approach , 2018, IACR Cryptol. ePrint Arch..
[10] Miklós Ajtai,et al. Secure computation with information leaking to an adversary , 2011, STOC.
[11] Adrian Thillard,et al. Randomness Complexity of Private Circuits for Multiplication , 2016, EUROCRYPT.
[12] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[13] Jean-Sébastien Coron,et al. Higher Order Masking of Look-up Tables , 2014, IACR Cryptol. ePrint Arch..
[14] Emmanuel Prouff,et al. Random Probing Security: Verification, Composition, Expansion and New Constructions , 2020, IACR Cryptol. ePrint Arch..
[15] Jean-Sébastien Coron,et al. Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme , 2016, CHES.
[16] Emmanuel Prouff,et al. Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.
[17] Marcin Andrychowicz,et al. Circuit Compilers with O(1/\log (n)) Leakage Rate , 2016, EUROCRYPT.
[18] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[19] Jean-Sébastien Coron,et al. Higher-Order Side Channel Security and Mask Refreshing , 2013, FSE.