Masking countermeasure

E Prouff - Encyclopedia of Cryptography, Security and Privacy, 2023 - Springer
Masking countermeasures, aka secret sharing or duplication, have been introduced
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …

Horizontal side-channel attacks and countermeasures on the ISW masking scheme

A Battistello, JS Coron, E Prouff, R Zeitoun - International Conference on …, 2016 - Springer
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …

Further improving efficiency of higher order masking schemes by decreasing randomness complexity

R Zhang, S Qiu, Y Zhou - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Most cryptographic implementations are vulnerable to side-channel attacks. Among the
countermeasures, masking is the most popular one. In the field of provable secure masking …

Provably secure higher-order masking of AES

M Rivain, E Prouff - … on Cryptographic Hardware and Embedded Systems, 2010 - Springer
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …

[HTML][HTML] A unified masking approach

H Groß, S Mangard - Journal of cryptographic engineering, 2018 - Springer
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …

Masks Will Fall Off Higher-Order Optimal Distinguishers

N Bruneau, S Guilley, A Heuser, O Rioul - … 7-11, 2014, Proceedings, Part II …, 2014 - Springer
Higher-order side-channel attacks are able to break the security of cryptographic
implementations even if they are protected with masking countermeasures. In this paper, we …

Masking against side-channel attacks: A formal security proof

E Prouff, M Rivain - Annual International Conference on the Theory and …, 2013 - Springer
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …

Inner product masking revisited

J Balasch, S Faust, B Gierlichs - … on the Theory and Applications of …, 2015 - Springer
Masking is a popular countermeasure against side channel attacks. Many practical works
use Boolean masking because of its simplicity, ease of implementation and comparably low …

Redundant code-based masking revisited

N Costes, M Stam - IACR Transactions on Cryptographic Hardware …, 2021 - tches.iacr.org
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …