Towards Tight Random Probing Security
暂无分享,去创建一个
François-Xavier Standaert | Sebastian Faust | Gaëtan Cassiers | Maximilian Orlt | François-Xavier Standaert | Sebastian Faust | Gaëtan Cassiers | Maximilian Orlt
[1] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[2] Jean-Sébastien Coron,et al. Higher-Order Side Channel Security and Mask Refreshing , 2013, FSE.
[3] Antoine Joux,et al. How to Securely Compute with Noisy Leakage in Quasilinear Complexity , 2018, IACR Cryptol. ePrint Arch..
[4] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[5] Alain Passelègue,et al. Unifying Leakage Models on a Rényi Day , 2019, IACR Cryptol. ePrint Arch..
[6] Stefan Dziembowski,et al. Simple Refreshing in the Noisy Leakage Model , 2019, ASIACRYPT.
[7] Pascal Sasdrich,et al. SILVER - Statistical Independence and Leakage Verification , 2020, IACR Cryptol. ePrint Arch..
[8] Stefan Mangard,et al. Formal Verification of Masked Hardware Implementations in the Presence of Glitches , 2018, IACR Cryptol. ePrint Arch..
[9] Marcin Andrychowicz,et al. Circuit Compilers with O(1/\log (n)) Leakage Rate , 2016, EUROCRYPT.
[10] François-Xavier Standaert,et al. Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate: or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks , 2019 .
[11] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[12] Amir Moradi,et al. Leakage assessment methodology , 2016, Journal of Cryptographic Engineering.
[13] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[14] Benjamin Grégoire,et al. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults , 2019, ESORICS.
[15] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[16] Emmanuel Prouff,et al. Random Probing Security: Verification, Composition, Expansion and New Constructions , 2020, IACR Cryptol. ePrint Arch..
[17] Jean-Sébastien Coron,et al. Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme , 2016, CHES.
[18] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[19] Benjamin Grégoire,et al. Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification , 2021, IACR Cryptol. ePrint Arch..
[20] Emmanuel Prouff,et al. Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.
[21] Maciej Skorski,et al. Noisy Leakage Revisited , 2015, EUROCRYPT.
[22] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[23] Vincent Rijmen,et al. Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches , 2011, Journal of Cryptology.
[24] Yuval Ishai,et al. Private Circuits: A Modular Approach , 2018, IACR Cryptol. ePrint Arch..
[25] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.