Higher-Order Masking Schemes for S-Boxes
- 1 January 2012
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 27 references indexed in Scilit:
- Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative MaskingsLecture Notes in Computer Science, 2011
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy CasesLecture Notes in Computer Science, 2010
- Side Channel Cryptanalysis of a Higher Order Masking SchemeLecture Notes in Computer Science, 2007
- PRESENT: An Ultra-Lightweight Block CipherLecture Notes in Computer Science, 2006
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- Provably Secure Masking of AESLecture Notes in Computer Science, 2004
- A Fast and Secure Implementation of SflashLecture Notes in Computer Science, 2002
- An Implementation of DES and AES, Secure against Some AttacksLecture Notes in Computer Science, 2001
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- DES and Differential Power Analysis The “Duplication” MethodLecture Notes in Computer Science, 1999