High Order Masking of Look-up Tables with Common Shares
暂无分享,去创建一个
Jean-Sébastien Coron | Franck Rondepierre | Rina Zeitoun | J. Coron | R. Zeitoun | Franck Rondepierre
[1] Stefan Mangard,et al. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers , 2006, CT-RSA.
[2] Jean-Sébastien Coron,et al. Faster Evaluation of SBoxes via Common Shares , 2016, CHES.
[3] Srinivas Vivek,et al. Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures , 2014, CHES.
[4] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[5] Jean-Sébastien Coron,et al. Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations , 2018, IACR Cryptol. ePrint Arch..
[6] Emmanuel Prouff,et al. Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.
[7] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[8] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[9] Jean-Sébastien Coron,et al. Higher Order Masking of Look-up Tables , 2014, IACR Cryptol. ePrint Arch..
[10] Claude Carlet,et al. Algebraic Decomposition for Probing Security , 2015, CRYPTO.
[11] Emmanuel Prouff,et al. Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis , 2008, FSE.
[12] Claude Carlet,et al. Higher-Order Masking Schemes for S-Boxes , 2012, FSE.
[13] Benjamin Grégoire,et al. Strong Non-Interference and Type-Directed Higher-Order Masking , 2016, CCS.
[14] Srinivas Vivek,et al. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 , 2013, CHES.
[15] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..