Reducing the number of non-linear multiplications in masking schemes
J Pulkus, S Vivek - … on Cryptographic Hardware and Embedded Systems, 2016 - Springer
In recent years, methods to securely mask S-boxes against side-channel attacks by
representing them as polynomials over finite binary fields have become quite efficient. A …
representing them as polynomials over finite binary fields have become quite efficient. A …
White-box filtering attacks breaking SEL masking: from exponential to polynomial time
A Charlès, A Udovenko - Cryptology ePrint Archive, 2024 - eprint.iacr.org
This work proposes a new white-box attack technique called filtering, which can be
combined with any other trace-based attack method. The idea is to filter the traces based on …
combined with any other trace-based attack method. The idea is to filter the traces based on …
Efficient masked hardware implementation of symmetric cryptographic primitives
A Rezaei Shahmirzadi - 2024 - hss-opus.ub.ruhr-uni-bochum.de
In our digital era, the integration of digital solutions into daily life for convenience is
widespread, necessitating robust cryptographic algorithms for data protection. While …
widespread, necessitating robust cryptographic algorithms for data protection. While …
Improved high-order conversion from Boolean to arithmetic masking
Masking is a very common countermeasure against side channel attacks. When combining
Boolean and arithmetic masking, one must be able to convert between the two types of …
Boolean and arithmetic masking, one must be able to convert between the two types of …
Deep learning based side channel attacks in practice
H Maghrebi - Cryptology ePrint Archive, 2019 - eprint.iacr.org
A recent line of research has investigated a new profiling technique based on deep learning
as an alternative to the well-known template attack. The advantage of this new profiling …
as an alternative to the well-known template attack. The advantage of this new profiling …
A Thorough Evaluation of RAMBAM
The application of masking, widely regarded as the most robust and reliable
countermeasure against Side-Channel Analysis~(SCA) attacks, has been the subject of …
countermeasure against Side-Channel Analysis~(SCA) attacks, has been the subject of …
Share-slicing: Friend or foe?
Masking is a well loved and widely deployed countermeasure against side channel attacks,
in particular in software. Under certain assumptions (wrt independence and noise level) …
in particular in software. Under certain assumptions (wrt independence and noise level) …
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
Side-Channel Attacks are powerful attacks which can recover secret information in a
cryptographic device by analysing physical quantities such as power consumption. Masking …
cryptographic device by analysing physical quantities such as power consumption. Masking …
Side-channel robustness analysis of masked assembly codes using a symbolic approach
I Ben El Ouahma, QL Meunier, K Heydemann… - Journal of Cryptographic …, 2019 - Springer
Masking is a popular countermeasure against side-channel attacks, which randomizes
secret data with random and uniform variables called masks. At software level, masking is …
secret data with random and uniform variables called masks. At software level, masking is …