Reducing the number of non-linear multiplications in masking schemes

J Pulkus, S Vivek - … on Cryptographic Hardware and Embedded Systems, 2016 - Springer
In recent years, methods to securely mask S-boxes against side-channel attacks by
representing them as polynomials over finite binary fields have become quite efficient. A …

White-box filtering attacks breaking SEL masking: from exponential to polynomial time

A Charlès, A Udovenko - Cryptology ePrint Archive, 2024 - eprint.iacr.org
This work proposes a new white-box attack technique called filtering, which can be
combined with any other trace-based attack method. The idea is to filter the traces based on …

[引用][C] Masking as a side-channel countermeasure in hardware

A Moradi - dated Sep, 2016

Efficient masked hardware implementation of symmetric cryptographic primitives

A Rezaei Shahmirzadi - 2024 - hss-opus.ub.ruhr-uni-bochum.de
In our digital era, the integration of digital solutions into daily life for convenience is
widespread, necessitating robust cryptographic algorithms for data protection. While …

Improved high-order conversion from Boolean to arithmetic masking

L Bettale, JS Coron, R Zeitoun - IACR Transactions on Cryptographic …, 2018 - tches.iacr.org
Masking is a very common countermeasure against side channel attacks. When combining
Boolean and arithmetic masking, one must be able to convert between the two types of …

Deep learning based side channel attacks in practice

H Maghrebi - Cryptology ePrint Archive, 2019 - eprint.iacr.org
A recent line of research has investigated a new profiling technique based on deep learning
as an alternative to the well-known template attack. The advantage of this new profiling …

A Thorough Evaluation of RAMBAM

D Lammers, A Moradi, N Müller… - Proceedings of the …, 2023 - dl.acm.org
The application of masking, widely regarded as the most robust and reliable
countermeasure against Side-Channel Analysis~(SCA) attacks, has been the subject of …

Share-slicing: Friend or foe?

S Gao, B Marshall, D Page, E Oswald - IACR Transactions on …, 2020 - tches.iacr.org
Masking is a well loved and widely deployed countermeasure against side channel attacks,
in particular in software. Under certain assumptions (wrt independence and noise level) …

VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations

Q Meunier, A Taleb - 20th International Conference on Security and …, 2023 - hal.science
Side-Channel Attacks are powerful attacks which can recover secret information in a
cryptographic device by analysing physical quantities such as power consumption. Masking …

Side-channel robustness analysis of masked assembly codes using a symbolic approach

I Ben El Ouahma, QL Meunier, K Heydemann… - Journal of Cryptographic …, 2019 - Springer
Masking is a popular countermeasure against side-channel attacks, which randomizes
secret data with random and uniform variables called masks. At software level, masking is …