Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference20 articles.
1. Beyne, T., Dhooghe, S., Zhang, Z.: Cryptanalysis of masked ciphers: A not so random idea. IACR Cryptol. ePrint Arch. 2020, 993, https://eprint.iacr.org/2020/993 (2020)
2. Bilgin, B., Gierlichs, B., Nikova, S., Nikov, V., Rijmen, V.: Higher-order threshold implementations. In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology – ASIACRYPT 2014, Part II. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-662-45608-8_18, vol. 8874, pp 326–343. Springer, Heidelberg (2014)
3. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop. https://doi.org/10.1007/978-3-540-74735-2_31, vol. 4727, pp 450–466. Springer, Vienna (2007)
4. Braeken, A., Nikov, V., Nikova, S., Preneel, B.: On boolean functions with generalized cryptographic properties. In: Canteaut, A., Viswanathan, K. (eds.) Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Proceedings. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-540-30556-9_11, vol. 3348, pp 120–135. Springer, Chennai (2004)
5. Cassiers, G., Grégoire, B., Levi, I., Standaert, F.: Hardware private circuits: From trivial composition to full verification. IACR Cryptol. ePrint Arch. 2020, 185, https://eprint.iacr.org/2020/185 (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Second-Order Low-Randomness d + 1 Hardware Sharing of the AES;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07