Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms in order to extract sensitive information such as the secret key. These physical attacks are among the most powerful attacks against real-world crypto-systems. In recent years, there has been a number of proposals how to increase the resilience of ciphers against side-channel attacks. One class of proposals concentrates on the intrinsic resilience of ciphers and more precisely their S-boxes. A number of properties has been proposed such as the transparency order, the confusion coefficient and the modified transparency order. Although results with those properties confirm that they are (to some extent) related with the S-box resilience, there...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
Masking schemes represent a well-researched and successful option to follow when considering side-ch...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
Masking schemes represent a well-researched and successful option to follow when considering side-ch...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...