Symbolic approach for side-channel resistance analysis of masked assembly codes
IB El Ouahma, QL Meunier, K Heydemann… - Security Proofs for …, 2017 - hal.science
Masking is a popular countermeasure against side-channel attacks, which randomizes
secret data with random and uniform variables called masks. At software level, masking is …
secret data with random and uniform variables called masks. At software level, masking is …
[PDF][PDF] Reducing Risks Through Simplicity
Countermeasures against side-channel attacks are in general expensive, and a lot of
research has been devoted to the optimization of their security vs. performance trade-off …
research has been devoted to the optimization of their security vs. performance trade-off …
Secure and Verified Cryptographic Implementations in the Random Probing Model
AR Taleb - 2023 - theses.hal.science
The masking countermeasure is among the most potent countermeasures to counteract side-
channel attacks. Leakage models have been exhibited to theoretically reason on the …
channel attacks. Leakage models have been exhibited to theoretically reason on the …
Side-channel masking with pseudo-random generator
High-order masking countermeasures against side-channel attacks usually require plenty of
randomness during their execution. For security against t probes, the classical ISW …
randomness during their execution. For security against t probes, the classical ISW …
Self-Timed Masking Implementing First-Order Masked S-Boxes Without Registers
Passive physical attacks represent a threat to microelectronics systems by exploiting
leakages through side-channels, such as power consumption and electromagnetic …
leakages through side-channels, such as power consumption and electromagnetic …
Mask compression: high-order masking on memory-constrained devices
MJO Saarinen, M Rossi - International Conference on Selected Areas in …, 2023 - Springer
Masking is a well-studied method for achieving provable security against side-channel
attacks. In masking, each sensitive variable is split into d randomized shares, and …
attacks. In masking, each sensitive variable is split into d randomized shares, and …
Towards finding best linear codes for side-channel protections
Side-channel attacks aim at extracting secret keys from cryptographic devices. Randomly
masking the implementation is a provable way to protect the secrets against this threat …
masking the implementation is a provable way to protect the secrets against this threat …
Low-Latency Hardware Masking of PRINCE
Efficient implementation of Boolean masking in terms of low latency has evolved into a hot
topic due to the necessity of embedding a physically secure and at-the-same-time fast …
topic due to the necessity of embedding a physically secure and at-the-same-time fast …
Provable Secure Parallel Gadgets
Side-channel attacks are a fundamental threat to the security of cryptographic
implementations. One of the most prominent countermeasures against side-channel attacks …
implementations. One of the most prominent countermeasures against side-channel attacks …
Masking against side-channel attacks: A formal security proof
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …