Главная
Study mode:
on
1
Introduction
2
Satan Attacks
3
Overview
4
Masking
5
Automatic Generation
6
Tornado Pipeline
7
Verification
8
Performance
9
Summary
Description:
Explore a cutting-edge paper on cryptographic implementation security presented at Eurocrypt 2020. Delve into the Tornado framework for automatically generating probing-secure masked bitsliced implementations. Learn about Satan attacks, masking techniques, and the Tornado pipeline. Understand the verification process and performance implications of this innovative approach to enhancing cryptographic security against side-channel attacks.

Tornado- Automatic Generation of Probing-Secure Masked Bitsliced Implementations

TheIACR
Add to list