Spectral Approach to Process the High-Order Template Attack Against any Masking Scheme
M Ouladj, S Guilley, M Ouladj, S Guilley - Side-Channel Analysis of …, 2021 - Springer
Spectral Approach to Process the High-Order Template Attack Against any Masking Scheme |
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …
Toward finding best linear codes for side-channel protections (extended version)
Side-channel attacks aim at extracting secret keys from cryptographic devices. Randomly
masking the implementation is a provable way to protect the secrets against this threat …
masking the implementation is a provable way to protect the secrets against this threat …
From random probing to noisy leakages without field-size dependence
Side channel attacks are devastating attacks targeting cryptographic implementations. To
protect against these attacks, various countermeasures have been proposed–in particular …
protect against these attacks, various countermeasures have been proposed–in particular …
Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry
G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …
against side-channel attacks. It is common practice to analyze the security of these schemes …
[PDF][PDF] Towards side-channel secure block ciphers.
V Grosso - 2015 - dial.uclouvain.be
Since the late 90's side-channel attacks have been a threat for cryptographic
implementations. They use observations of physical features of a device while it computes …
implementations. They use observations of physical features of a device while it computes …
Side-channel information leakage of code-based masked implementations
Side-channel attacks (SCAs) are among the most powerful physical attacks against
cryptographic implementations. To thwart SCAs, a well-established countermeasure is …
cryptographic implementations. To thwart SCAs, a well-established countermeasure is …
Low-latency hardware masking of PRINCE
Efficient implementation of Boolean masking in terms of low latency has evolved into a hot
topic due to the necessity of embedding a physically secure and at-the-same-time fast …
topic due to the necessity of embedding a physically secure and at-the-same-time fast …
Higher-order masking in practice: A vector implementation of masked AES for ARM NEON
Real-world software implementations of cryptographic algorithms need to be able to resist
various kinds of side-channel attacks, in particular Differential Power Analysis (DPA) …
various kinds of side-channel attacks, in particular Differential Power Analysis (DPA) …
Inner product masking revisited
Masking is a popular countermeasure against side channel attacks. Many practical works
use Boolean masking because of its simplicity, ease of implementation and comparably low …
use Boolean masking because of its simplicity, ease of implementation and comparably low …
Masking the aes with only two random bits
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …
Even though masking was introduced almost 20 years ago, its efficient implementation …