Author:
de Groot Wouter,Papagiannopoulos Kostas,de La Piedra Antonio,Schneider Erik,Batina Lejla
Publisher
Springer International Publishing
Reference49 articles.
1. Lecture Notes in Computer Science;M-L Akkar,2004
2. Lecture Notes in Computer Science;J Balasch,2015
3. Lecture Notes in Computer Science;J Balasch,2015
4. Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptology 24(2), 269–291 (2011)
5. Lecture Notes in Computer Science;R Benadjila,2014
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Context Switching of Masked Software Implementations;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10
2. Side-Channel Attacks on Masked Bitsliced Implementations of AES;Cryptography;2022-06-28
3. Architecture Support for Bitslicing;IEEE Transactions on Emerging Topics in Computing;2022
4. Secure and Efficient Software Masking on Superscalar Pipelined Processors;Lecture Notes in Computer Science;2021
5. RLM: a new mask countermeasure to resist HO-CPA for GIFT;2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS);2020-03