2017
DOI: 10.1007/978-3-319-52153-4_21
|View full text |Cite
|
Sign up to set email alerts
|

My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…In this paper, we focus on Boolean masking, the most frequently implemented approach. In a Boolean masking scheme with d-shares, an intermediate state x is split into d shares x (1) , x (2) , ..., x (d) where…”
Section: Masking Schemesmentioning
confidence: 99%
See 4 more Smart Citations
“…In this paper, we focus on Boolean masking, the most frequently implemented approach. In a Boolean masking scheme with d-shares, an intermediate state x is split into d shares x (1) , x (2) , ..., x (d) where…”
Section: Masking Schemesmentioning
confidence: 99%
“…For linear components P , implementing a Boolean masking is quite straightforward: as P (x (1) (1) ) ⊕ P (x (2) ) ⊕ ... ⊕ P (x (d) ), simply applying P to all d shares gives the expected outputs. For non-linear components (Sboxes), things become tricker.…”
Section: Masking Schemesmentioning
confidence: 99%
See 3 more Smart Citations