2018
DOI: 10.1007/s13389-018-0194-9
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial direct sum masking to protect against both SCA and FIA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Various masking techniques have been developed to either augment or replace Boolean masking, as reported in Table 2. [42] with a goal of protecting against physical glitches. In PM, the basic masking computation is done by function Σ(𝑍𝑋 ), where 𝑍 is a mask vector, 𝑋 is a secret vector, and Σ is XOR operation.…”
Section: Beyond Boolean Maskingmentioning
confidence: 99%
See 1 more Smart Citation
“…Various masking techniques have been developed to either augment or replace Boolean masking, as reported in Table 2. [42] with a goal of protecting against physical glitches. In PM, the basic masking computation is done by function Σ(𝑍𝑋 ), where 𝑍 is a mask vector, 𝑋 is a secret vector, and Σ is XOR operation.…”
Section: Beyond Boolean Maskingmentioning
confidence: 99%
“…This masking scheme provides more algebraic complexity, where the masking computation is done by 𝑋𝐺 ⊕ 𝑍𝐻 , where 𝑋 and 𝑍 are secret input, and random masks respectively, but 𝐺 and 𝐻 represent generator matrices of the vector spaces designated for secret input and masks, respectively. The work in [42] proposed a practical DSM scheme for AES. It detects and corrects errors in a manner that decreases the memory requirements and computation time.…”
Section: Inner Product Masking (Ipm)mentioning
confidence: 99%