共 34 条
[11]
Genelle L., Prouff E., Quisquater M., Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings, CHES 2011. LNCS, 6917, pp. 240-255, (2011)
[12]
Genelle L., Prouff E., Quisquater M., Thwarting higher-order side channel analysis with additive and multiplicative maskings, CHES 2011. LNCS, 6917, pp. 240-255, (2011)
[13]
Ghodosi H., Pieprzyk J., Steinfeld R., Multi-party computation with conversion of secret sharing, Designs, 62, 3, pp. 259-272, (2012)
[14]
Grosso V., Standaert F.X., Faust S., Masking vs. Multiparty Computation: How Large Is the Gap for AES?, CHES 2013. LNCS, 8086, pp. 400-416, (2013)
[15]
Herbst C., Oswald E., Mangard S., An AES Smart Card Implementation Resistant to Power Analysis Attacks, ACNS 2006. LNCS, 3989, pp. 239-252, (2006)
[16]
Joye M., Yen S.M., The Montgomery Powering Ladder, CHES 2002. LNCS, 2523, pp. 291-302, (2003)
[17]
Lampe R., Patarin J., Seurin Y., An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher, 34, pp. 278-295
[18]
Lampe R., Seurin Y., How to Construct an Ideal Cipher from a Small Set of Public Permutations, ASIACRYPT 2013, Part I. LNCS, 8269, pp. 444-463, (2013)
[19]
Lyubashevsky V., Micciancio D., Peikert C., Rosen A., SWIFFT: A Modest Proposal for FFT Hashing, FSE 2008. LNCS, 5086, pp. 54-72, (2008)
[20]
Lyubashevsky V., Peikert C., Regev O., On Ideal Lattices and Learning with Errors over Rings, EUROCRYPT 2010. LNCS, 6110, pp. 1-23, (2010)