Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Balasch J, Faust S, Gierlichs B, Paglialonga C, Standaert F (2017) Consolidating inner product masking. In: Takagi T, Peyrin T (eds) Advances in Cryptology – ASIACRYPT 2017 – 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3–7 Dec, 2017. Proceedings, Part I. Lecture Notes in Computer Science, vol 10624. Springer, pp 724–754. https://doi.org/10.1007/978-3-319-70694-8_25
2. Barthe G, Belaïd S, Dupressoir F, Fouque P, Grégoire B, Strub P (2015) Verified proofs of higher-order masking. In: Oswald E, Fischlin M (eds) Advances in Cryptology – EUROCRYPT 2015 – 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26–30 Apr, 2015. Proceedings, Part I. Lecture Notes in Computer Science, vol 9056. Springer, pp 457–485. https://doi.org/10.1007/978-3-662-46800-5_18
3. Ben-Or M, Goldwasser S, Wigderson A (1988) Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: STOC’88: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing. ACM, New York, pp 1–10. http://doi.acm.org/10.1145/62212.62213
4. Belaïd S, Benhamouda F, Passelègue A, Prouff E, Thillard A, Vergnaud D (2017) Private multiplication over finite fields. In: Katz J, Shacham H (eds) Advances in Cryptology – CRYPTO 2017 – 37th Annual International Cryptology Conference, Santa Barbara, CA, 20–24 Aug, 2017. Proceedings, Part III. Lecture Notes in Computer Science, vol 10403, Springer, pp 397–426. https://doi.org/10.1007/978-3-319-63697-9_14
5. Boscher A, Handschuh H (2008) Masking does not protect against differential fault attacks. In: Breveglieri L, Gueron S, Koren I, Naccache D, Seifert JP (eds) Fault diagnosis and tolerance in cryptography – FDTC 2008. IEEE Computer Society, pp 35–40
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献