Schneider, Tobias; Paglialonga, Clara; Oder, Tobias; Güneysu, Tim Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto. (English) Zbl 07159417 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-17258-9/pbk; 978-3-030-17259-6/ebook). Lecture Notes in Computer Science 11443, 534-564 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 11443, 534--564 (2019; Zbl 07159417) Full Text: DOI
Schneider, Tobias; Moradi, Amir; Standaert, François-Xavier; Güneysu, Tim Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms. (English) Zbl 1412.94208 Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 58-78 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 10532, 58--78 (2017; Zbl 1412.94208) Full Text: DOI
Boss, Erik; Grosso, Vincent; Güneysu, Tim; Leander, Gregor; Moradi, Amir; Schneider, Tobias Strong 8-bit sboxes with efficient masking in hardware. (English) Zbl 1429.94053 Gierlichs, Benedikt (ed.) et al., Cryptographic hardware and embedded systems – CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17–19, 2016. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 9813, 171-193 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Boss} et al., Lect. Notes Comput. Sci. 9813, 171--193 (2016; Zbl 1429.94053) Full Text: DOI
Schneider, Tobias; Moradi, Amir; Güneysu, Tim ParTI – towards combined hardware countermeasures against side-channel and fault-injection attacks. (English) Zbl 1391.94796 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 302-332 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 9815, 302--332 (2016; Zbl 1391.94796) Full Text: DOI
Schneider, Tobias; Moradi, Amir; Güneysu, Tim Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware. (English) Zbl 1423.94103 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 559-578 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 9092, 559--578 (2015; Zbl 1423.94103) Full Text: DOI