Provably Secure Countermeasures against Side-channel Attacks

PK Vadnala - 2015 - orbilu.uni.lu
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms
leak information about the secret key. In power analysis attacks, the observable leakage is …

Quantile: Quantifying Information Leakage

V Hadžić, G Cassiers, R Primas, S Mangard… - IACR Transactions on …, 2024 - tches.iacr.org
The masking countermeasure is very effective against side-channel attacks such as
differential power analysis. However, the design of masked circuits is a challenging problem …

A unified metric for quantifying information leakage of cryptographic devices under power analysis attacks

L Zhang, AA Ding, Y Fei, P Luo - … on the Theory and Application of …, 2015 - Springer
To design effective countermeasures for cryptosystems against side-channel power analysis
attacks, the evaluation of the system leakage has to be lightweight and often times at the …

[PDF][PDF] Masking against Side-Channel Attacks: a Formal Security Proof

M Rivain - 2013 - pdfs.semanticscholar.org
Masking against Side-Channel Attacks: a Formal Security Proof Page 1 Masking against
Side-Channel Attacks: a Formal Security Proof Matthieu Rivain Joint work with Emmanuel Prouff …

Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices

T Roche, V Lomné - Constructive Side-Channel Analysis and Secure …, 2013 - Springer
In this paper we study the collision-correlation attack published by Clavier et al. at CHES
2011 on a 1 st-order Boolean masking scheme and show its lack of robustness against …

Crucial pitfall of DPA Contest V4. 2 implementation

Z Martinasek, F Iglesias, L Malina… - Security and …, 2016 - Wiley Online Library
Differential power analysis (DPA) is a powerful side‐channel key recovery attack that
efficiently breaks cryptographic algorithm implementations. In order to prevent these types of …

A first-order leak-free masking countermeasure

H Maghrebi, E Prouff, S Guilley, JL Danger - Topics in Cryptology–CT-RSA …, 2012 - Springer
One protection of cryptographic implementations against side-channel attacks is the
masking of the sensitive variables. In this article, we present a first-order masking that does …

[PDF][PDF] Composable and efficient masking schemes for side-channel secure implementations.

G Cassiers - 2022 - dial.uclouvain.be
Modern cryptography has been widely deployed in the last decades, allowing any
computing device to secure its communications. Facing the strength of the cryptographic …

Secure and Verified Cryptographic Implementations in the Random Probing Model

AR Taleb - 2023 - theses.hal.science
The masking countermeasure is among the most potent countermeasures to counteract side-
channel attacks. Leakage models have been exhibited to theoretically reason on the …

Does coupling affect the security of masked implementations?

T De Cnudde, B Bilgin, B Gierlichs, V Nikov… - … Side-Channel Analysis …, 2017 - Springer
Masking schemes achieve provable security against side-channel analysis by using secret
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …