Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
33
views
18
references
Top references
cited by
14
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,649
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Progress in Cryptology – AFRICACRYPT 2014
A More Efficient AES Threshold Implementation
other
Author(s):
Begül Bilgin
,
Benedikt Gierlichs
,
Svetla Nikova
,
Ventzislav Nikov
,
Vincent Rijmen
Publication date
(Print):
2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
18
Record
: found
Abstract
: not found
Book Chapter
: not found
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
François-Xavier Standaert
,
Tal G. Malkin
,
Moti Yung
(2009)
0
comments
Cited
73
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Pushing the Limits: A Very Compact and a Threshold Implementation of AES
Amir Moradi
,
Axel Poschmann
,
San Ling
…
(2011)
0
comments
Cited
43
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Side-Channel Leakage of Masked CMOS Gates
Stefan Mangard
,
Thomas Popp
,
Berndt Gammel
(2005)
0
comments
Cited
35
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 267-284
DOI:
10.1007/978-3-319-06734-6_17
SO-VID:
0fb062e3-1bf3-42fd-8871-c6d43c53e5d7
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 267
A More Efficient AES Threshold Implementation
pp. 318
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Similar content
2,649
Otsinka efektyvnosti suchasnoho kremnez′omnoho enterosorbentu «Bile vuhillya» (aerosil) ta vitchyznyanoho hepatoprotektoru antralyu u likvidatoriv naslidkiv avariyi na Chornobyl′s′kiy AES z khronichnoyu spoluchenoyu patolohiyeyu hepatobiliarnoyi systemy [Evaluation of the effectiveness of the modern siliceous enterosorbent “White coal” (aerosil) and the domestic hepatoprotector antral in liquidators of the consequences of the accident at the Chernobyl nuclear power plant with chronic combined pathology of the hepatobiliary system]
Authors:
OY Babak
,
GD Fadeyenko
,
VM Frolov
…
Patient-reported outcomes (PRO) focused on adverse events (PRO-AEs) in adjuvant and metastatic breast cancer: clinical and translational implications.
Authors:
Stefan Stefanovic
,
Markus Wallwiener
,
Uros Karic
…
An investigation of surface segregation in magnetron-sputtered NbSi using UPS and AES
Authors:
P. Hucknall
,
G. A. H. Walker
,
D. GREIG
…
See all similar
Cited by
14
Higher-Order Threshold Implementations
Authors:
Begul Bilgin
,
Benedikt Gierlichs
,
Svetla Nikova
…
Consolidating Masking Schemes
Authors:
Oscar Reparaz
,
Begul Bilgin
,
Svetla Nikova
…
On the Cost of Lazy Engineering for Masked Software Implementations
Authors:
Josep Balasch
,
Benedikt Gierlichs
,
Vincent G. Grosso
…
See all cited by