Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
24
views
29
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,846
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
other
Author(s):
Marcel Medwed
,
François-Xavier Standaert
,
Antoine Joux
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Exponential Random Graph Models
Most cited references
29
Record
: found
Abstract
: not found
Book Chapter
: not found
Private Circuits: Securing Hardware against Probing Attacks
Yuval Ishai
,
Amit Sahai
,
David N Wagner
(2003)
0
comments
Cited
112
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Template Attacks
Suresh T. Chari
,
Josyula Rao
,
Pankaj Rohatgi
(2003)
0
comments
Cited
96
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On the Importance of Checking Cryptographic Protocols for Faults
Dan Boneh
,
Richard Demillo
,
Richard Lipton
(1997)
0
comments
Cited
80
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 193-212
DOI:
10.1007/978-3-642-33027-8_12
SO-VID:
14abd2eb-a325-4234-8be1-060678218cc5
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
3D Hardware Canaries
pp. 23
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
pp. 41
Simple Photonic Emission Analysis of AES
pp. 58
Compiler Assisted Masking
pp. 76
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
pp. 92
How Far Should Theory Be from Practice?
pp. 107
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
pp. 122
A Differential Fault Attack on the Grain Family of Stream Ciphers
pp. 140
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
pp. 155
Selecting Time Samples for Multivariate DPA Attacks
pp. 175
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
pp. 193
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
pp. 213
Practical Leakage-Resilient Symmetric Cryptography
pp. 233
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
pp. 251
Practical Security Analysis of PUF-Based Two-Player Protocols
pp. 268
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
pp. 283
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
pp. 302
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
pp. 320
NEON Crypto
pp. 340
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
pp. 356
Solving Quadratic Equations with XL on Parallel Architectures
pp. 374
Efficient Implementations of MQPKS on Constrained Devices
pp. 390
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
pp. 408
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
pp. 426
Low-Latency Encryption – Is “Lightweight = Light + Wait”?
pp. 447
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication
pp. 463
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA
pp. 476
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
pp. 494
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs
pp. 512
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
pp. 530
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
pp. 548
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
Similar content
1,846
Constraint-Hiding Constrained PRFs for NC \(^1\) from LWE
Authors:
Ran Canetti
,
Yilei Chen
Characterization of Susceptibility Artifacts in MR-thermometry PRFS-based during Laser Interstitial Thermal Therapy
Authors:
Martina Landro
,
Céline Giraudeau
,
Juan Verde
…
Key homomorphic PRFs and their applications
Authors:
D. Boneh
,
K Lewi
,
H. MONTGOMERY
…
See all similar
Cited by
6
Security Evaluations beyond Computing Power
Authors:
Nicolas Veyrat-Charvillon
,
Benoît Gérard
,
François-Xavier Standaert
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
Authors:
J. Longo
,
E. De Mulder
,
D. Page
…
Practical Leakage-Resilient Symmetric Cryptography
Authors:
Sebastian Faust
,
Krzysztof Pietrzak
,
Joachim Schipper
See all cited by