Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Dušan Božilov"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 2 (2021)
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks. Constructing SCA-protected AES, as the most widely deployed block cipher, has been na
Externí odkaz:
https://doaj.org/article/f9b49f81d1424dbaaed61dd132858106
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 398-404 (2017)
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms. We show that there exist 75 affine equivalence classes of 5-bit quadrati
Externí odkaz:
https://doaj.org/article/127afc98d7ee483eb12ea23559f814e9
ispartof: JOURNAL OF CRYPTOGRAPHIC ENGINEERING vol:12 issue:1 pages:15-51 status: published
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::50cbdb40c9a88811d5da0f639164546f
https://lirias.kuleuven.be/handle/123456789/685073
https://lirias.kuleuven.be/handle/123456789/685073
Autor:
Maria Eichlseder, Ventzislav Nikov, Shahram Rasoolzadeh, Thorben Moos, Dušan Božilov, Gregor Leander, Baptiste Lambin, Friedrich Wiemer, Yosuke Todo, Miroslav Knezevic
Publikováno v:
Selected Areas in Cryptography ISBN: 9783030816513
SAC
SAC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9701d1c45b03b5a55380c787d0018ea5
https://doi.org/10.1007/978-3-030-81652-0_19
https://doi.org/10.1007/978-3-030-81652-0_19
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030420673
CARDIS
CARDIS
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In this work, we first provide a generic construction for \(d+1\) TI sharing which achieves the minima
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::efd089095f5d74cfb0d1d9d5f55c8072
https://doi.org/10.1007/978-3-030-42068-0_2
https://doi.org/10.1007/978-3-030-42068-0_2
Publikováno v:
Journal of Cryptographic Engineering; Apr2022, Vol. 12 Issue 1, p15-51, 37p
Autor:
Riham AlTawy, Andreas Hülsing
This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.• The 23 full papers presented in this volume were carefully reviewed
This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed a
Autor:
Shiho Moriai, Huaxiong Wang
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020
Autor:
Sonia Belaïd, Tim Güneysu
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019. The 15 revised full papers