Optimizing inner product masking scheme by a coding theory approach

W Cheng, S Guilley, C Carlet… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Masking is one of the most popular countermeasures to protect cryptographic
implementations against side-channel analysis since it is provably secure and can be …

Packed multiplication: how to amortize the cost of side-channel masking?

W Wang, C Guo, FX Standaert, Y Yu… - … Conference on the Theory …, 2020 - Springer
Higher-order masking countermeasures provide strong provable security against side-
channel attacks at the cost of incurring significant overheads, which largely hinders its …

Physical security versus masking schemes

JL Danger, S Guilley, A Heuser, A Legay… - Cyber-Physical Systems …, 2018 - Springer
Numerous masking schemes have been designed as provable countermeasures against
side-channel attacks. However, currently, several side-channel attack models coexist, such …

Does coupling affect the security of masked implementations?

T De Cnudde, B Bilgin, B Gierlichs, V Nikov… - Cryptology ePrint …, 2016 - eprint.iacr.org
Masking schemes achieve provable security against side-channel analysis by using secret
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …

Horizontal side-channel attacks and countermeasures on the ISW masking scheme

A Battistello, JS Coron, E Prouff, R Zeitoun - International Conference on …, 2016 - Springer
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …

Analysis and comparison of table-based arithmetic to boolean masking

M Van Beirendonck, JP D'Anvers… - IACR Transactions on …, 2021 - tches.iacr.org
Masking is a popular technique to protect cryptographic implementations against side-
channel attacks and comes in several variants including Boolean and arithmetic masking …

[PDF][PDF] Re-Consolidating First-Order Masking Schemes

NF Randomness - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …

Low randomness masking and shuffling: An evaluation using mutual information

K Papagiannopoulos - IACR Transactions on Cryptographic …, 2018 - tches.iacr.org
Side-channel countermeasure designers often face severe performance overheads when
trying to protect a device. Widely applied countermeasures such as masking and shuffling …

A statistical model for higher order DPA on masked devices

AA Ding, L Zhang, Y Fei, P Luo - … , Busan, South Korea, September 23-26 …, 2014 - Springer
A popular effective countermeasure to protect block cipher implementations against
differential power analysis (DPA) attacks is to mask the internal operations of the …

Does coupling affect the security of masked implementations?

T De Cnudde, B Bilgin, B Gierlichs, V Nikov… - … Side-Channel Analysis …, 2017 - Springer
Masking schemes achieve provable security against side-channel analysis by using secret
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …