Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- 1 January 2009
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- A New DPA Countermeasure Based on Permutation TablesLecture Notes in Computer Science, 2008
- Side Channel Cryptanalysis of a Higher Order Masking SchemeLecture Notes in Computer Science, 2007
- An AES Smart Card Implementation Resistant to Power Analysis AttacksLecture Notes in Computer Science, 2006
- On Second-Order Differential Power AnalysisLecture Notes in Computer Science, 2005
- Hardware Countermeasures against DPA – A Statistical Analysis of Their EffectivenessLecture Notes in Computer Science, 2004
- An Implementation of DES and AES, Secure against Some AttacksLecture Notes in Computer Science, 2001
- Differential Power Analysis in the Presence of Hardware CountermeasuresLecture Notes in Computer Science, 2000
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- DES and Differential Power Analysis The “Duplication” MethodLecture Notes in Computer Science, 1999