Optimizing inner product masking scheme by a coding theory approach
Masking is one of the most popular countermeasures to protect cryptographic
implementations against side-channel analysis since it is provably secure and can be …
implementations against side-channel analysis since it is provably secure and can be …
Packed multiplication: how to amortize the cost of side-channel masking?
Higher-order masking countermeasures provide strong provable security against side-
channel attacks at the cost of incurring significant overheads, which largely hinders its …
channel attacks at the cost of incurring significant overheads, which largely hinders its …
Physical security versus masking schemes
Numerous masking schemes have been designed as provable countermeasures against
side-channel attacks. However, currently, several side-channel attack models coexist, such …
side-channel attacks. However, currently, several side-channel attack models coexist, such …
Does coupling affect the security of masked implementations?
T De Cnudde, B Bilgin, B Gierlichs, V Nikov… - Cryptology ePrint …, 2016 - eprint.iacr.org
Masking schemes achieve provable security against side-channel analysis by using secret
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …
Horizontal side-channel attacks and countermeasures on the ISW masking scheme
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
Analysis and comparison of table-based arithmetic to boolean masking
M Van Beirendonck, JP D'Anvers… - IACR Transactions on …, 2021 - tches.iacr.org
Masking is a popular technique to protect cryptographic implementations against side-
channel attacks and comes in several variants including Boolean and arithmetic masking …
channel attacks and comes in several variants including Boolean and arithmetic masking …
[PDF][PDF] Re-Consolidating First-Order Masking Schemes
NF Randomness - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
Low randomness masking and shuffling: An evaluation using mutual information
K Papagiannopoulos - IACR Transactions on Cryptographic …, 2018 - tches.iacr.org
Side-channel countermeasure designers often face severe performance overheads when
trying to protect a device. Widely applied countermeasures such as masking and shuffling …
trying to protect a device. Widely applied countermeasures such as masking and shuffling …
A statistical model for higher order DPA on masked devices
A popular effective countermeasure to protect block cipher implementations against
differential power analysis (DPA) attacks is to mask the internal operations of the …
differential power analysis (DPA) attacks is to mask the internal operations of the …
Does coupling affect the security of masked implementations?
Masking schemes achieve provable security against side-channel analysis by using secret
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …