Author:
Valencia Felipe,Polian Ilia,Regazzoni Francesco
Publisher
Springer International Publishing
Reference39 articles.
1. Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The em side-channel(s). In: CHES 2002, pp. 29–45 (2003)
2. Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing - STOC 1996, Association for Computing Machinery (ACM) (1996)
3. Alkim, E., et al.: Newhope - algorithm specifications and supporting documentation (2018)
4. Arribas, V., De Cnudde, T., Sijacic, D.: Glitch-resistant masking schemes as countermeasure against fault sensitivity Analysis. In: FDTC (2018)
5. Baan, H., et al.: Round2: KEM and PKE based on GLWR. Cryptology ePrint Archive, Report 2017/1183 (2017)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fault Sensitivity Analysis;Encyclopedia of Cryptography, Security and Privacy;2023
2. Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-;2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC);2021-09
3. On resilience of security-oriented error detecting architectures against power attacks;Proceedings of the 18th ACM International Conference on Computing Frontiers;2021-05-11
4. Anomalous Behaviour in Embedded Systems;Hardware Supply Chain Security;2020-10-21