Provably Secure Countermeasures against Side-channel Attacks
PK Vadnala - 2015 - orbilu.uni.lu
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms
leak information about the secret key. In power analysis attacks, the observable leakage is …
leak information about the secret key. In power analysis attacks, the observable leakage is …
Quantile: Quantifying Information Leakage
The masking countermeasure is very effective against side-channel attacks such as
differential power analysis. However, the design of masked circuits is a challenging problem …
differential power analysis. However, the design of masked circuits is a challenging problem …
A unified metric for quantifying information leakage of cryptographic devices under power analysis attacks
To design effective countermeasures for cryptosystems against side-channel power analysis
attacks, the evaluation of the system leakage has to be lightweight and often times at the …
attacks, the evaluation of the system leakage has to be lightweight and often times at the …
[PDF][PDF] Masking against Side-Channel Attacks: a Formal Security Proof
M Rivain - 2013 - pdfs.semanticscholar.org
Masking against Side-Channel Attacks: a Formal Security Proof Page 1 Masking against
Side-Channel Attacks: a Formal Security Proof Matthieu Rivain Joint work with Emmanuel Prouff …
Side-Channel Attacks: a Formal Security Proof Matthieu Rivain Joint work with Emmanuel Prouff …
Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices
T Roche, V Lomné - Constructive Side-Channel Analysis and Secure …, 2013 - Springer
In this paper we study the collision-correlation attack published by Clavier et al. at CHES
2011 on a 1 st-order Boolean masking scheme and show its lack of robustness against …
2011 on a 1 st-order Boolean masking scheme and show its lack of robustness against …
Crucial pitfall of DPA Contest V4. 2 implementation
Differential power analysis (DPA) is a powerful side‐channel key recovery attack that
efficiently breaks cryptographic algorithm implementations. In order to prevent these types of …
efficiently breaks cryptographic algorithm implementations. In order to prevent these types of …
A first-order leak-free masking countermeasure
One protection of cryptographic implementations against side-channel attacks is the
masking of the sensitive variables. In this article, we present a first-order masking that does …
masking of the sensitive variables. In this article, we present a first-order masking that does …
[PDF][PDF] Composable and efficient masking schemes for side-channel secure implementations.
G Cassiers - 2022 - dial.uclouvain.be
Modern cryptography has been widely deployed in the last decades, allowing any
computing device to secure its communications. Facing the strength of the cryptographic …
computing device to secure its communications. Facing the strength of the cryptographic …
Secure and Verified Cryptographic Implementations in the Random Probing Model
AR Taleb - 2023 - theses.hal.science
The masking countermeasure is among the most potent countermeasures to counteract side-
channel attacks. Leakage models have been exhibited to theoretically reason on the …
channel attacks. Leakage models have been exhibited to theoretically reason on the …
Does coupling affect the security of masked implementations?
Masking schemes achieve provable security against side-channel analysis by using secret
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …