Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Bo...
Saved in:
Main Authors: | Alexander DeTrano, Naghmeh Karimi, Ramesh Karri, Xiaofei Guo, Claude Carlet, Sylvain Guilley |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2015-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2015/743618 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Effect of Double Masking with Silk or Cotton Over-masks on the Source Control Capabilities of a Surgical Mask
by: Adam F. Parlin, et al.
Published: (2022-04-01) -
Exploiting statistical effective fault attack in a blind setting
by: Navid Vafaei, et al.
Published: (2023-07-01) -
SqueezeMaskNet: Real-Time Mask-Wearing Recognition for Edge Devices
by: Gibran Benitez-Garcia, et al.
Published: (2025-01-01) -
APDL: an adaptive step size method for white-box adversarial attacks
by: Jiale Hu, et al.
Published: (2025-01-01) -
Mask Material Filtration Efficiency and Mask Fitting at the Crossroads: Implications during Pandemic Times
by: Karin Ardon-Dryer, et al.
Published: (2021-03-01)