共 50 条
- [31] Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 1 - 13
- [32] Pinpointing the side-channel leakage of masked AES hardware implementations CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 76 - 90
- [33] Fault-Assisted Side-Channel Analysis of Masked Implementations PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 57 - 64
- [36] Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III, 2020, 12107 : 311 - 341
- [37] Automated Verification of Correctness for Masked Arithmetic Programs COMPUTER AIDED VERIFICATION, CAV 2023, PT III, 2023, 13966 : 255 - 280
- [39] LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 18 - 37
- [40] Exploring Multi-task Learning in the Context of Masked AES Implementations CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2024, 2024, 14595 : 93 - 112