Symbolic approach for side-channel resistance analysis of masked assembly codes

IB El Ouahma, QL Meunier, K Heydemann… - Security Proofs for …, 2017 - hal.science
Masking is a popular countermeasure against side-channel attacks, which randomizes
secret data with random and uniform variables called masks. At software level, masking is …

[PDF][PDF] Reducing Risks Through Simplicity

O Bronchain, T Schneider, FX Standaert - perso.uclouvain.be
Countermeasures against side-channel attacks are in general expensive, and a lot of
research has been devoted to the optimization of their security vs. performance trade-off …

Secure and Verified Cryptographic Implementations in the Random Probing Model

AR Taleb - 2023 - theses.hal.science
The masking countermeasure is among the most potent countermeasures to counteract side-
channel attacks. Leakage models have been exhibited to theoretically reason on the …

Side-channel masking with pseudo-random generator

JS Coron, A Greuet, R Zeitoun - … on the Theory and Applications of …, 2020 - Springer
High-order masking countermeasures against side-channel attacks usually require plenty of
randomness during their execution. For security against t probes, the classical ISW …

Self-Timed Masking Implementing First-Order Masked S-Boxes Without Registers

M Simoes, L Bossuet, N Bruneau, V Grosso… - 21st Smart Card …, 2022 - hal.science
Passive physical attacks represent a threat to microelectronics systems by exploiting
leakages through side-channels, such as power consumption and electromagnetic …

Mask compression: high-order masking on memory-constrained devices

MJO Saarinen, M Rossi - International Conference on Selected Areas in …, 2023 - Springer
Masking is a well-studied method for achieving provable security against side-channel
attacks. In masking, each sensitive variable is split into d randomized shares, and …

Towards finding best linear codes for side-channel protections

W Cheng, Y Liu, S Guilley… - … Workshop on Security …, 2021 - telecom-paris.hal.science
Side-channel attacks aim at extracting secret keys from cryptographic devices. Randomly
masking the implementation is a provable way to protect the secrets against this threat …

Low-Latency Hardware Masking of PRINCE

T Moos, A Moradi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Efficient implementation of Boolean masking in terms of low latency has evolved into a hot
topic due to the necessity of embedding a physically secure and at-the-same-time fast …

Provable Secure Parallel Gadgets

F Berti, S Faust, M Orlt - IACR Transactions on Cryptographic …, 2023 - tches.iacr.org
Side-channel attacks are a fundamental threat to the security of cryptographic
implementations. One of the most prominent countermeasures against side-channel attacks …

Masking against side-channel attacks: A formal security proof

E Prouff, M Rivain - Annual International Conference on the Theory and …, 2013 - Springer
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …