共 50 条
- [21] Masking kyber: First-and higher-order implementations IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (04): : 173 - 214
- [23] Randomness Optimization for Gadget Compositions in Higher-Order Masking IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 188 - 227
- [24] Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 1100 - 1123
- [25] Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 171 - 188
- [26] Boosting Higher-Order Correlation Attacks by Dimensionality Reduction SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 183 - +
- [27] Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2018, 2018, 10815 : 3 - 22
- [28] Correlation Power Analysis and Higher-Order Masking Implementation of WAGE SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 593 - 614
- [29] Logical Encoding of Argumentation Frameworks with Higher-order Attacks 2018 IEEE 30TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2018, : 667 - 674
- [30] Argumentation Frameworks with Higher-Order Attacks: Labellings and Complexity 2020 IEEE 32ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2020, : 1210 - 1217