Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Barthe G, Belaïd S, Dupressoir F, Fouque P, Grégoire B, Strub P, Zucchini R (2016) Strong non-interference and type-directed higher-order masking. In: CCS. ACM, pp 116–129
2. Belaïd S, Rivain M, Taleb AR (2021) On the power of expansion: more efficient constructions in the random probing model. In: EUROCRYPT (2). Lecture notes in computer science, vol 12697. Springer, pp 313–343
3. Cassiers G, Standaert F (2020) Trivially and efficiently composing masked gadgets with probe isolating non-interference. IEEE Trans Inf Foren Secur 15:2542–2555
4. Cassiers G, Faust S, Orlt M, Standaert F (2021) Towards tight random probing security. In: CRYPTO (3). Lecture notes in computer science, vol 12827. Springer, pp 185–214
5. Chari S, Jutla CS, Rao JR, Rohatgi P (1999) Towards sound approaches to counteract power-analysis attacks. In: CRYPTO. Lecture notes in computer science, vol 1666. Springer, pp 398–412