Side channel cryptanalysis of a higher order masking scheme

JS Coron, E Prouff, M Rivain - … and Embedded Systems-CHES 2007: 9th …, 2007 - Springer
In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order
DPA have been improved and successfully applied to break many masked implementations …

Spectral approach to process the (multivariate) high-order template attack against any masking scheme

M Ouladj, S Guilley, P Guillot, F Mokrane - Journal of Cryptographic …, 2022 - Springer
Cryptographic software is particularly vulnerable to side-channel attacks when programmed
in embedded devices. Indeed, the leakage is particularly intense compared to the noise …

Low entropy masking schemes, revisited

V Grosso, FX Standaert, E Prouff - … on Smart Card Research and Advanced …, 2013 - Springer
Abstract Low Entropy Masking Schemes (LEMS) are a recent countermeasure against side-
channel attacks. They aim at reducing the randomness requirements of masking schemes …

[PDF][PDF] Provable Secure Countermeasures Against Side-Channel Attacks

C Paglialonga - 2021 - tuprints.ulb.tu-darmstadt.de
Side-channel attacks are a prominent threat to the security of cryptographic
implementations. Differently from the traditional black-box attacks, which exploit the inputs …

Masking AES with shares in hardware

T De Cnudde, O Reparaz, B Bilgin, S Nikova… - … and Embedded Systems, 2016 - Springer
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …

Formal analysis of the entropy/security trade-off in first-order masking countermeasures against side-channel attacks

M Nassar, S Guilley, JL Danger - International Conference on Cryptology …, 2011 - Springer
Several types of countermeasures against side-channel attacks are known. The one called
masking is of great interest since it can be applied to any protocol and/or algorithm, without …

Table recomputation-based higher-order masking against horizontal attacks

Z Guo, M Tang, E Prouff, M Luo… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Masking is a class of well-known countermeasure against side-channel analysis by
employing the idea of secret sharing. The theoretical security proof model of higher-order …

Provably secure higher-order masking of AES

M Rivain, E Prouff - … on Cryptographic Hardware and Embedded Systems, 2010 - Springer
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …

First-order masking with only two random bits

H Gross, K Stoffelen, L De Meyer, M Krenn… - Proceedings of ACM …, 2019 - dl.acm.org
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …

[PDF][PDF] " Analysis and implementation of side-channel countermeasures for NIST lightweight cryptography finalists

C Verhamme - dial.uclouvain.be
The information age is seeing an increasing number of embedded applications, ranging
from sensor networks to distributed control systems, not forgetting the IoT. What all these …