Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
Zeyi LiuNeng GaoChenyang TuYuan MaZongbin LiuPublished in: SAC (2016)
Keyphrases
- countermeasures
- s box
- chaotic map
- differential power analysis
- information security
- power analysis
- block cipher
- security flaws
- advanced encryption standard
- security vulnerabilities
- security risks
- authentication scheme
- buffer overflow
- hash functions
- watermarking technique
- fixed point
- secret sharing scheme
- attack scenarios
- efficient implementation
- human visual system
- smart card