Quantile: Quantifying Information Leakage

V Hadžić, G Cassiers, R Primas, S Mangard… - IACR Transactions on …, 2024 - tches.iacr.org
The masking countermeasure is very effective against side-channel attacks such as
differential power analysis. However, the design of masked circuits is a challenging problem …

Practical attacks on masked hardware

T Popp, M Kirschbaum, S Mangard - Topics in Cryptology–CT-RSA 2009 …, 2009 - Springer
In this paper we analyze recently introduced questions for masked logic styles in general
and for one such logic style called MDPL in particular. The DPA resistance of MDPL suffers …

Faster mask conversion with lookup tables

PK Vadnala, J Großschädl - … Side-Channel Analysis and Secure Design …, 2015 - Springer
Masking is an effective and widely-used countermeasure to thwart Differential Power
Analysis (DPA) attacks on symmetric cryptosystems. When a symmetric cipher involves a …

Side-channel masking with common shares

W Wang, C Guo, Y Yu, F Ji, Y Su - IACR Transactions on …, 2022 - tches.iacr.org
To counter side-channel attacks, a masking scheme randomly encodes keydependent
variables into several shares, and transforms operations into the masked correspondence …

Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners

A Covic, F Ganji, D Forte - arXiv preprint arXiv:2106.12714, 2021 - arxiv.org
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …

A first-order leak-free masking countermeasure

H Maghrebi, E Prouff, S Guilley, JL Danger - Topics in Cryptology–CT-RSA …, 2012 - Springer
One protection of cryptographic implementations against side-channel attacks is the
masking of the sensitive variables. In this article, we present a first-order masking that does …

Domain-Oriented Masking: Generically Masked Hardware Implementations

H Groß - 2018 - graz.elsevierpure.com
An ever-growing number of devices are threatened by low-cost Side-Channel Analysis
(SCA) attacks and therefore require efficient protection mechanisms. Masking provides a …

Randomness generation for secure hardware masking-unrolled trivium to the rescue

G Cassiers, L Masure, C Momin, T Moos… - Cryptology ePrint …, 2023 - eprint.iacr.org
Masking is a prominent strategy to protect cryptographic implementations against side-
channel analysis. Its popularity arises from the exponential security gains that can be …

Randomness optimization for gadget compositions in higher-order masking

J Feldtkeller, D Knichel, P Sasdrich, A Moradi… - Cryptology ePrint …, 2022 - eprint.iacr.org
Physical characteristics of electronic devices, leaking secret and sensitive information to an
adversary with physical access, pose a long-known threat to cryptographic hardware …

Efficient profiled attacks on masking schemes

L Lerman, O Markowitch - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Side-channel adversaries represent real-world threats against (certified and uncertified)
cryptographic devices. Masking schemes represent prevailing countermeasures to reduce …