User menu

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

Bibliographic reference Wang, Weijia ; Standaert, François-Xavier ; Yu, Yu ; Pu, Sihang ; Liu, Junrong ; et. al. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Cannes (France), du 07/11/2016 au 09/11/2016). In: Kerstin Lemke-Rust, Michael Tunstall, Proceedings of the 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016), Springer : Trier2016, p. 174-191
Permanent URL http://hdl.handle.net/2078.1/187158
  1. Balasch Josep, Faust Sebastian, Gierlichs Benedikt, Inner Product Masking Revisited, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.486-510, 10.1007/978-3-662-46800-5_19
  2. Barthe Gilles, Belaïd Sonia, Dupressoir François, Fouque Pierre-Alain, Grégoire Benjamin, Strub Pierre-Yves, Verified Proofs of Higher-Order Masking, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.457-485, 10.1007/978-3-662-46800-5_18
  3. Carlet Claude, Guilley Sylvain, Complementary dual codes for counter-measures to side-channel attacks, 10.3934/amc.2016.10.131
  4. Castagnos Guilhem, Renner Soline, Zémor Gilles, High-order Masking by Using Coding Theory and Its Application to AES, Cryptography and Coding (2013) ISBN:9783642452383 p.193-212, 10.1007/978-3-642-45239-0_12
  5. Duc Alexandre, Faust Sebastian, Standaert François-Xavier, Making Masking Security Proofs Concrete, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.401-429, 10.1007/978-3-662-46800-5_16
  6. Fumaroli Guillaume, Martinelli Ange, Prouff Emmanuel, Rivain Matthieu, Affine Masking against Higher-Order Side Channel Analysis, Selected Areas in Cryptography (2011) ISBN:9783642195730 p.262-280, 10.1007/978-3-642-19574-7_18
  7. Goubin Louis, Martinelli Ange, Protecting AES with Shamir’s Secret Sharing Scheme, Cryptographic Hardware and Embedded Systems – CHES 2011 (2011) ISBN:9783642239502 p.79-94, 10.1007/978-3-642-23951-9_6
  8. Grosso Vincent, Leurent Gaëtan, Standaert François-Xavier, Varıcı Kerem, LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations, Fast Software Encryption (2015) ISBN:9783662467053 p.18-37, 10.1007/978-3-662-46706-0_2
  9. Grosso Vincent, Standaert François-Xavier, Prouff Emmanuel, Low Entropy Masking Schemes, Revisited, Smart Card Research and Advanced Applications (2014) ISBN:9783319083018 p.33-43, 10.1007/978-3-319-08302-5_3
  10. Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
  11. Journault, A., Standaert, F.X., Varici, K.: Improving the security and efficiency of block ciphers based on LS-designs. In: 9th International Workshop on Coding and Cryptography, WCC 2015, Paris, France, April 2015
  12. Oswald, E., Fischlin, M. (eds.): EUROCRYPT 2015. LNCS, vol. 9056. Springer, Heidelberg (2015)
  13. Preneel, B., Takagi, T. (eds.): CHES 2011. LNCS, vol. 6917. Springer, Heidelberg (2011)
  14. Prouff Emmanuel, Roche Thomas, Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols, Cryptographic Hardware and Embedded Systems – CHES 2011 (2011) ISBN:9783642239502 p.63-78, 10.1007/978-3-642-23951-9_5
  15. Rivain Matthieu, Prouff Emmanuel, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.413-427, 10.1007/978-3-642-15031-9_28
  16. Standaert François-Xavier, Malkin Tal G., Yung Moti, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.443-461, 10.1007/978-3-642-01001-9_26
  17. Standaert François-Xavier, Veyrat-Charvillon Nicolas, Oswald Elisabeth, Gierlichs Benedikt, Medwed Marcel, Kasper Markus, Mangard Stefan, The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology - ASIACRYPT 2010 (2010) ISBN:9783642173721 p.112-129, 10.1007/978-3-642-17373-8_7