Side Channel Cryptanalysis of a Higher Order Masking Scheme
- 22 August 2007
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- On Second-Order Differential Power AnalysisLecture Notes in Computer Science, 2005
- Templates as Master KeysLecture Notes in Computer Science, 2005
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- Template AttacksLecture Notes in Computer Science, 2003
- An Implementation of DES and AES, Secure against Some AttacksLecture Notes in Computer Science, 2001
- Securing the AES Finalists Against Power Analysis AttacksLecture Notes in Computer Science, 2001
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- DES and Differential Power Analysis The “Duplication” MethodLecture Notes in Computer Science, 1999
- Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 1991