Redundant code-based masking revisited
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
Inner product masking revisited
Masking is a popular countermeasure against side channel attacks. Many practical works
use Boolean masking because of its simplicity, ease of implementation and comparably low …
use Boolean masking because of its simplicity, ease of implementation and comparably low …
Optimizing inner product masking scheme by a coding theory approach
Masking is one of the most popular countermeasures to protect cryptographic
implementations against side-channel analysis since it is provably secure and can be …
implementations against side-channel analysis since it is provably secure and can be …
Provable order amplification for code-based masking: How to avoid non-linear leakages due to masked operations
Code-based masking schemes have been shown to provide higher theoretical security
guarantees than Boolean masking. In particular, one interesting feature put forward at …
guarantees than Boolean masking. In particular, one interesting feature put forward at …
First-order masking with only two random bits
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …
Even though masking was introduced almost 20 years ago, its efficient implementation …
Horizontal side-channel attacks and countermeasures on the ISW masking scheme
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
Effective and efficient masking with low noise using small-mersenne-prime ciphers
Embedded devices used in security applications are natural targets for physical attacks.
Thus, enhancing their side-channel resistance is an important research challenge. A …
Thus, enhancing their side-channel resistance is an important research challenge. A …
From random probing to noisy leakages without field-size dependence
Side channel attacks are devastating attacks targeting cryptographic implementations. To
protect against these attacks, various countermeasures have been proposed–in particular …
protect against these attacks, various countermeasures have been proposed–in particular …
Masking against side-channel attacks: A formal security proof
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
Removing the field size loss from Duc et al.'s conjectured bound for masked encodings
Abstract At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel
attack targeting an intermediate computation encoded in a linear secret-sharing, aka …
attack targeting an intermediate computation encoded in a linear secret-sharing, aka …