b |
Bit-interaction leakage | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor |
bootloader use-case | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities |
c |
Chain of Trust | XMSS-based Chain of Trust |
Code-based Masking Scheme | Towards Finding Best Linear Codes for Side-Channel Protections |
d |
Detection based defenses | Locality Based Cache Side-channel Attack Detection |
Dilithium | XMSS-based Chain of Trust |
f |
fault injection robustness | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities |
FLSS | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
h |
handshake protocol | XMSS-based Chain of Trust |
high-level information | Locality Based Cache Side-channel Attack Detection |
i |
Information-Theoretic Metric | Towards Finding Best Linear Codes for Side-Channel Protections |
l |
linear code | Towards Finding Best Linear Codes for Side-Channel Protections |
locality | Locality Based Cache Side-channel Attack Detection |
m |
Masking | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor |
multiple-layer sieve | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
p |
post-quantum cryptography | XMSS-based Chain of Trust |
r |
RISC-V | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor |
s |
serial implementation | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
Share-slicing | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor |
Side Channel Attack | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
side-channel analysis | Towards Finding Best Linear Codes for Side-Channel Protections |
side-channel attacks | Locality Based Cache Side-channel Attack Detection |
simulation | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor |
SMLS | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
source code static analysis | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities |
stacking attack | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
symbolic execution | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities |
t |
TLSs | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
w |
weight distribution | Towards Finding Best Linear Codes for Side-Channel Protections |
x |
XMSS | XMSS-based Chain of Trust |