搜索结果: 1-3 共查到“密码学 probing model”相关记录3条 . 查询时间(0.209 秒)
Threshold Implementations (TI) are secure algorithmic countermeasures against side-channel attacks in the form of differential power analysis. The strength of TI lies in its minimal algorithmic requir...
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed
Side-channel analysis Masking Robust Probing Model
2018/5/28
Implementing the masking countermeasure in hardware is a delicate task. Various solutions have been proposed for this purpose over the last years: we focus on Threshold Implementations (TIs), Domain-O...
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model
side-channel attacks masking probing security proofs physical defaults
2017/7/26
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable properties for secure implementations of masking schemes. While tools exist to guarantee them separatel...