Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
暂无分享,去创建一个
Jean-Sébastien Coron | Mehdi Tibouchi | Johann Großschädl | Praveen Kumar Vadnala | J. Coron | Mehdi Tibouchi | J. Großschädl
[1] Mi-Jung Noh,et al. DIFFERENTIAL POWER ATTACK AND MASKING METHOD , 2005 .
[2] Jason Smith,et al. The SIMON and SPECK Families of Lightweight Block Ciphers , 2013, IACR Cryptol. ePrint Arch..
[3] Harold S. Stone,et al. A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations , 1973, IEEE Transactions on Computers.
[4] Jean-Sébastien Coron,et al. A New Algorithm for Switching from Arithmetic to Boolean Masking , 2003, CHES.
[5] Jean-Sébastien Coron,et al. Secure Conversion between Boolean and Arithmetic Masking of Any Order , 2014, CHES.
[6] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[7] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[8] James H. Burrows,et al. Secure Hash Standard , 1995 .
[9] Louis Goubin,et al. A Sound Method for Switching between Boolean and Arithmetic Masking , 2001, CHES.
[10] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[11] Jürgen Pulkus,et al. Switching Blindings with a View Towards IDEA , 2004, CHES.
[12] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[13] Stefan Mangard,et al. Power Analysis Attacks and Countermeasures , 2007, IEEE Design & Test of Computers.
[14] Blandine Debraize. Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking , 2012, CHES.
[15] S StoneHarold,et al. A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations , 1973 .
[16] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[17] Marc Joye,et al. Addition with Blinded Operands , 2014, COSADE.