Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages
暂无分享,去创建一个
Dawu Gu | François-Xavier Standaert | Zheng Guo | Junrong Liu | Sihang Pu | Weijia Wang | Yu Yu | François-Xavier Standaert | Dawu Gu | Weijia Wang | Junrong Liu | Yu Yu | Zheng Guo | Sihang Pu
[1] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[2] François-Xavier Standaert,et al. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations , 2014, FSE.
[3] Gilles Zémor,et al. High-order Masking by Using Coding Theory and Its Application to AES , 2013, IMACC.
[4] Markus Kasper,et al. The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..
[5] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[6] François-Xavier Standaert,et al. Low Entropy Masking Schemes, Revisited , 2013, CARDIS.
[7] Josep Balasch,et al. Inner Product Masking Revisited , 2015, EUROCRYPT.
[8] Emmanuel Prouff,et al. Affine Masking against Higher-Order Side Channel Analysis , 2010, IACR Cryptol. ePrint Arch..
[9] Louis Goubin,et al. Protecting AES with Shamir's Secret Sharing Scheme , 2011, CHES.
[10] Benjamin Grégoire,et al. Verified Proofs of Higher-Order Masking , 2015, EUROCRYPT.
[11] François-Xavier Standaert,et al. Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device , 2015, EUROCRYPT.
[12] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[13] Claude Carlet,et al. Complementary dual codes for counter-measures to side-channel attacks , 2016, Adv. Math. Commun..
[14] François-Xavier Standaert,et al. Improving the security and efficiency of block ciphers based on LS-designs , 2016, Designs, Codes and Cryptography.
[15] Emmanuel Prouff,et al. Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols , 2011, CHES.
[16] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[17] Marc Fischlin,et al. Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I , 2015, EUROCRYPT.