Provably Secure Higher-Order Masking of AES
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 34 references indexed in Scilit:
- Higher-Order Masking and Shuffling for Software Implementations of Block CiphersLecture Notes in Computer Science, 2009
- Secure Hardware Implementation of Non-linear Functions in the Presence of GlitchesLecture Notes in Computer Science, 2009
- A Very Compact S-Box for AESLecture Notes in Computer Science, 2005
- Successfully Attacking Masked AES Hardware ImplementationsLecture Notes in Computer Science, 2005
- Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure ComputationLecture Notes in Computer Science, 2005
- Side-Channel Leakage of Masked CMOS GatesLecture Notes in Computer Science, 2005
- Physically Observable CryptographyLecture Notes in Computer Science, 2004
- Provably Secure Masking of AESLecture Notes in Computer Science, 2004
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- How to share a secretCommunications of the ACM, 1979