Low-latency masking with arbitrary protection order based on click elements

M Simões, L Bossuet, N Bruneau… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Masking is the main countermeasure against side-channel attacks due to its sound formal
proof of security and the scalability of its protection parameters. However, effective masking …

Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Passive physical attacks, like power analysis, pose a serious threat to the security of
embedded systems and corresponding countermeasures need to be implemented. In this …

Security Order of Gate-Level Masking Schemes

S Takarabt, J Bahrami, M Ebrahimabadi… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Masking schemes have been introduced to thwart side-channel attacks. In software
applications, attackers can measure leakage at several points in time and combine them to …

Detecting flawed masking schemes with leakage detection tests

O Reparaz - … Encryption: 23rd International Conference, FSE 2016 …, 2016 - Springer
Masking is a popular countermeasure to thwart side-channel attacks on embedded systems.
Many proposed masking schemes, even carrying “security proofs”, are eventually broken …

Compiler assisted masking

A Moss, E Oswald, D Page, M Tunstall - Cryptographic Hardware and …, 2012 - Springer
Abstract Differential Power Analysis (DPA) attacks find a statistical correlation between the
power consumption of a cryptographic device and intermediate values within the …

Crucial pitfall of DPA Contest V4. 2 implementation

Z Martinasek, F Iglesias, L Malina… - Security and …, 2016 - Wiley Online Library
Differential power analysis (DPA) is a powerful side‐channel key recovery attack that
efficiently breaks cryptographic algorithm implementations. In order to prevent these types of …

On the Simplicity of Converting Leakages from Multivariate to Univariate: (Case Study of a Glitch-Resistant Masking Scheme)

A Moradi, O Mischke - … Hardware and Embedded Systems-CHES 2013 …, 2013 - Springer
Several masking schemes to protect cryptographic implementations against side-channel
attacks have been proposed. A few considered the glitches, and provided security proofs in …

Evaluation of countermeasure implementations based on boolean masking to thwart side-channel attacks

H Maghrebi, JL Danger, F Flament… - … on signals, circuits …, 2009 - ieeexplore.ieee.org
This paper presents hardware implementations of a DES cryptoprocessor with masking
countermeasures and their evaluation against side-channel attacks (SCAs) in FPGAs. The …

Slicing up a perfect hardware masking scheme

Z Chen, P Schaumont - 2008 IEEE International Workshop on …, 2008 - ieeexplore.ieee.org
Masking is a side-channel countermeasure that randomizes side-channel leakage, such as
the power dissipation of a circuit. Masking is only effective on the condition that the internal …

There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks--Extended Version--

H Maghrebi, V Servant, J Bringer - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Side-channel attacks are an important concern for the security of cryptographic algorithms.
To counteract it, a recent line of research has investigated the use of software encoding …