Masking countermeasure
E Prouff - Encyclopedia of Cryptography, Security and Privacy, 2023 - Springer
Masking countermeasures, aka secret sharing or duplication, have been introduced
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …
Horizontal side-channel attacks and countermeasures on the ISW masking scheme
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
Further improving efficiency of higher order masking schemes by decreasing randomness complexity
R Zhang, S Qiu, Y Zhou - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Most cryptographic implementations are vulnerable to side-channel attacks. Among the
countermeasures, masking is the most popular one. In the field of provable secure masking …
countermeasures, masking is the most popular one. In the field of provable secure masking …
Provably secure higher-order masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …
(SCA). To counteract it, masking schemes are usually involved which randomize key …
Parallel implementations of masking schemes and the bounded moment leakage model
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
[HTML][HTML] A unified masking approach
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
Masks Will Fall Off Higher-Order Optimal Distinguishers
Higher-order side-channel attacks are able to break the security of cryptographic
implementations even if they are protected with masking countermeasures. In this paper, we …
implementations even if they are protected with masking countermeasures. In this paper, we …
Masking against side-channel attacks: A formal security proof
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
Inner product masking revisited
Masking is a popular countermeasure against side channel attacks. Many practical works
use Boolean masking because of its simplicity, ease of implementation and comparably low …
use Boolean masking because of its simplicity, ease of implementation and comparably low …
Redundant code-based masking revisited
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
bytes, the two classical options are Boolean masking and polynomial masking. The latter …