Redundant code-based masking revisited

N Costes, M Stam - IACR Transactions on Cryptographic Hardware …, 2021 - tches.iacr.org
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …

Inner product masking revisited

J Balasch, S Faust, B Gierlichs - … on the Theory and Applications of …, 2015 - Springer
Masking is a popular countermeasure against side channel attacks. Many practical works
use Boolean masking because of its simplicity, ease of implementation and comparably low …

Optimizing inner product masking scheme by a coding theory approach

W Cheng, S Guilley, C Carlet… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Masking is one of the most popular countermeasures to protect cryptographic
implementations against side-channel analysis since it is provably secure and can be …

Provable order amplification for code-based masking: How to avoid non-linear leakages due to masked operations

W Wang, Y Yu, FX Standaert - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Code-based masking schemes have been shown to provide higher theoretical security
guarantees than Boolean masking. In particular, one interesting feature put forward at …

First-order masking with only two random bits

H Gross, K Stoffelen, L De Meyer, M Krenn… - Proceedings of ACM …, 2019 - dl.acm.org
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …

Horizontal side-channel attacks and countermeasures on the ISW masking scheme

A Battistello, JS Coron, E Prouff, R Zeitoun - International Conference on …, 2016 - Springer
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …

Effective and efficient masking with low noise using small-mersenne-prime ciphers

L Masure, P Méaux, T Moos, FX Standaert - … International Conference on …, 2023 - Springer
Embedded devices used in security applications are natural targets for physical attacks.
Thus, enhancing their side-channel resistance is an important research challenge. A …

From random probing to noisy leakages without field-size dependence

G Brian, S Dziembowski, S Faust - … on the Theory and Applications of …, 2024 - Springer
Side channel attacks are devastating attacks targeting cryptographic implementations. To
protect against these attacks, various countermeasures have been proposed–in particular …

Masking against side-channel attacks: A formal security proof

E Prouff, M Rivain - Annual International Conference on the Theory and …, 2013 - Springer
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …

Removing the field size loss from Duc et al.'s conjectured bound for masked encodings

J Béguinot, W Cheng, S Guilley, Y Liu, L Masure… - … on Constructive Side …, 2023 - Springer
Abstract At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel
attack targeting an intermediate computation encoded in a linear secret-sharing, aka …