Spectral Approach to Process the High-Order Template Attack Against any Masking Scheme

M Ouladj, S Guilley, M Ouladj, S Guilley - Side-Channel Analysis of …, 2021 - Springer
Spectral Approach to Process the High-Order Template Attack Against any Masking Scheme |
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …

Toward finding best linear codes for side-channel protections (extended version)

W Cheng, Y Liu, S Guilley, O Rioul - Journal of Cryptographic Engineering, 2024 - Springer
Side-channel attacks aim at extracting secret keys from cryptographic devices. Randomly
masking the implementation is a provable way to protect the secrets against this threat …

From random probing to noisy leakages without field-size dependence

G Brian, S Dziembowski, S Faust - … on the Theory and Applications of …, 2024 - Springer
Side channel attacks are devastating attacks targeting cryptographic implementations. To
protect against these attacks, various countermeasures have been proposed–in particular …

Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry

G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …

[PDF][PDF] Towards side-channel secure block ciphers.

V Grosso - 2015 - dial.uclouvain.be
Since the late 90's side-channel attacks have been a threat for cryptographic
implementations. They use observations of physical features of a device while it computes …

Side-channel information leakage of code-based masked implementations

W Cheng, O Rioul, Y Liu, J Béguinot… - 2022 17th Canadian …, 2022 - ieeexplore.ieee.org
Side-channel attacks (SCAs) are among the most powerful physical attacks against
cryptographic implementations. To thwart SCAs, a well-established countermeasure is …

Low-latency hardware masking of PRINCE

N Müller, T Moos, A Moradi - … on Constructive Side-Channel Analysis and …, 2021 - Springer
Efficient implementation of Boolean masking in terms of low latency has evolved into a hot
topic due to the necessity of embedding a physically secure and at-the-same-time fast …

Higher-order masking in practice: A vector implementation of masked AES for ARM NEON

J Wang, PK Vadnala, J Großschädl, Q Xu - Cryptographers' Track at the …, 2015 - Springer
Real-world software implementations of cryptographic algorithms need to be able to resist
various kinds of side-channel attacks, in particular Differential Power Analysis (DPA) …

Inner product masking revisited

J Balasch, S Faust, B Gierlichs - … on the Theory and Applications of …, 2015 - Springer
Masking is a popular countermeasure against side channel attacks. Many practical works
use Boolean masking because of its simplicity, ease of implementation and comparably low …

Masking the aes with only two random bits

H Gross, K Stoffelen, L De Meyer, M Krenn… - Cryptology ePrint …, 2018 - eprint.iacr.org
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …