Schneider, Tobias; Paglialonga, Clara; Oder, Tobias; Güneysu, Tim Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto. (English) Zbl 07159417 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-17258-9/pbk; 978-3-030-17259-6/ebook). Lecture Notes in Computer Science 11443, 534-564 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 11443, 534--564 (2019; Zbl 07159417) Full Text: DOI
Faust, Sebastian; Paglialonga, Clara; Schneider, Tobias Amortizing randomness complexity in private circuits. (English) Zbl 1420.94062 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10624, 781-810 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Faust} et al., Lect. Notes Comput. Sci. 10624, 781--810 (2017; Zbl 1420.94062) Full Text: DOI
Schneider, Tobias; Moradi, Amir; Standaert, François-Xavier; Güneysu, Tim Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms. (English) Zbl 1412.94208 Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 58-78 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 10532, 58--78 (2017; Zbl 1412.94208) Full Text: DOI
Moradi, Amir; Schneider, Tobias Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series. (English) Zbl 1425.68102 Standaert, François-Xavier (ed.) et al., Constructive side-channel analysis and secure design. 7th international workshop, COSADE 2016, Graz, Austria, April 14–15, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9689, 71-87 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{A. Moradi} and \textit{T. Schneider}, Lect. Notes Comput. Sci. 9689, 71--87 (2016; Zbl 1425.68102) Full Text: DOI
Boss, Erik; Grosso, Vincent; Güneysu, Tim; Leander, Gregor; Moradi, Amir; Schneider, Tobias Strong 8-bit sboxes with efficient masking in hardware. (English) Zbl 1429.94053 Gierlichs, Benedikt (ed.) et al., Cryptographic hardware and embedded systems – CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17–19, 2016. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 9813, 171-193 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Boss} et al., Lect. Notes Comput. Sci. 9813, 171--193 (2016; Zbl 1429.94053) Full Text: DOI
Moradi, Amir; Schneider, Tobias Side-channel analysis protection and low-latency in action – case study of PRINCE and Midori. (English) Zbl 1404.94099 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 517-547 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Moradi} and \textit{T. Schneider}, Lect. Notes Comput. Sci. 10031, 517--547 (2016; Zbl 1404.94099) Full Text: DOI
Schneider, Tobias; Moradi, Amir; Güneysu, Tim ParTI – towards combined hardware countermeasures against side-channel and fault-injection attacks. (English) Zbl 1391.94796 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 302-332 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 9815, 302--332 (2016; Zbl 1391.94796) Full Text: DOI
Schneider, Tobias; Moradi, Amir Leakage assessment methodology. A clear roadmap for side-channel evaluations. (English) Zbl 1380.68171 Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 495-513 (2015). MSC: 68P25 62G10 94A60 PDF BibTeX XML Cite \textit{T. Schneider} and \textit{A. Moradi}, Lect. Notes Comput. Sci. 9293, 495--513 (2015; Zbl 1380.68171) Full Text: DOI
Schneider, Tobias; Moradi, Amir; Güneysu, Tim Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware. (English) Zbl 1423.94103 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 559-578 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 9092, 559--578 (2015; Zbl 1423.94103) Full Text: DOI