Publication:

Provable Secure Software Masking in the Real-World

 
dc.contributor.authorBeckers, Arthur
dc.contributor.authorWouters, Lennert
dc.contributor.authorGierlichs, Benedikt
dc.contributor.authorVerbauwhede, Ingrid
dc.contributor.authorPreneel, Bart
dc.contributor.imecauthorPreneel, Bart
dc.date.accessioned2022-05-05T13:37:49Z
dc.date.available2022-05-01T02:12:02Z
dc.date.available2022-05-05T13:37:49Z
dc.date.issued2022
dc.description.wosFundingTextThis work was supported in part by CyberSecurity Research Flanders with reference number VR20192203. In part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058. In addition, this work was supported by the European Commission through the Horizon 2020 research and innovation programme under grant agreement Cathedral ERC Advanced Grant 695305, under grant agreement H2020-FETFLAG-2018-03-820405 QRANGE and under grant agreement H2020-DS-LEIT-2017-780108 FENTEC.
dc.identifier.doi10.1007/978-3-030-99766-3_10
dc.identifier.eisbn978-3-030-99766-3
dc.identifier.isbn978-3-030-99765-6
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/39717
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage215
dc.source.conference13th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE)
dc.source.conferencedateAPR 11-12, 2022
dc.source.conferencelocationLeuven
dc.source.endpage235
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages21
dc.source.volume13211
dc.subject.keywordsPOWER ANALYSIS
dc.title

Provable Secure Software Masking in the Real-World

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: