Higher Order Masking of Look-Up Tables
Open Access
- 1 January 2014
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Masking against Side-Channel Attacks: A Formal Security ProofLecture Notes in Computer Science, 2013
- Higher-Order Masking Schemes for S-BoxesLecture Notes in Computer Science, 2012
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel AnalysisLecture Notes in Computer Science, 2008
- Side Channel Cryptanalysis of a Higher Order Masking SchemeLecture Notes in Computer Science, 2007
- An AES Smart Card Implementation Resistant to Power Analysis AttacksLecture Notes in Computer Science, 2006
- Template AttacksLecture Notes in Computer Science, 2003
- Private Circuits: Securing Hardware against Probing AttacksLecture Notes in Computer Science, 2003
- Using Second-Order Power Analysis to Attack DPA Resistant SoftwareLecture Notes in Computer Science, 2000
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- Differential Power AnalysisLecture Notes in Computer Science, 1999