Masking countermeasures against HO-DPA: security evaluation and enhancement by specific mask encodings

H Maghrebi - 2012 - pastel.hal.science
Side channel attacks take advantage of the fact that the power consumption of a
cryptographic device depends on the internally used secret key. A very common …

Provably Secure Countermeasures against Side-channel Attacks

PK Vadnala - 2015 - orbilu.uni.lu
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms
leak information about the secret key. In power analysis attacks, the observable leakage is …

Redundant code-based masking revisited

N Costes, M Stam - IACR Transactions on Cryptographic Hardware …, 2021 - tches.iacr.org
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …

Masking countermeasure

E Prouff - Encyclopedia of Cryptography, Security and Privacy, 2023 - Springer
Masking countermeasures, aka secret sharing or duplication, have been introduced
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …

Reconciling Masking in Hardware and Software

H Groß, S Mangard - … on Cryptographic Hardware and Embedded Systems, 2017 - Springer
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …

A unified masking approach

H Groß, S Mangard - Journal of cryptographic engineering, 2018 - Springer
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …

Function masking: A new countermeasure against side channel attack

T Kim, S Ahn, S Lee, D Choi - … Workshop, WISA 2014, Jeju Island, Korea …, 2015 - Springer
Masking schemes have been developed to implement secure cryptographic algorithms
against Side Channel Analysis (SCA) attacks. Technically, the first-order masking method is …

Re-consolidating first-order masking schemes: Nullifying fresh randomness

AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …

Optimal first-order masking with linear and non-linear bijections

H Maghrebi, C Carlet, S Guilley, JL Danger - International Conference on …, 2012 - Springer
Hardware devices can be protected against side-channel attacks by introducing one random
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …

[PDF][PDF] Composable and efficient masking schemes for side-channel secure implementations.

G Cassiers - 2022 - dial.uclouvain.be
Modern cryptography has been widely deployed in the last decades, allowing any
computing device to secure its communications. Facing the strength of the cryptographic …