Re-consolidating first-order masking schemes: Nullifying fresh randomness

AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …

Second-order SCA security with almost no fresh randomness

AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Masking schemes are among the most popular countermeasures against Side-Channel
Analysis (SCA) attacks. Realization of masked implementations on hardware faces several …

Reconciling Masking in Hardware and Software

H Groß, S Mangard - … on Cryptographic Hardware and Embedded Systems, 2017 - Springer
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …

A unified masking approach

H Groß, S Mangard - Journal of cryptographic engineering, 2018 - Springer
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …

First-order masking with only two random bits

H Gross, K Stoffelen, L De Meyer, M Krenn… - Proceedings of ACM …, 2019 - dl.acm.org
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …

Randomness generation for secure hardware masking-unrolled trivium to the rescue

G Cassiers, L Masure, C Momin, T Moos… - Cryptology ePrint …, 2023 - eprint.iacr.org
Masking is a prominent strategy to protect cryptographic implementations against side-
channel analysis. Its popularity arises from the exponential security gains that can be …

Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry

G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …

On the cost of lazy engineering for masked software implementations

J Balasch, B Gierlichs, V Grosso, O Reparaz… - Smart Card Research …, 2015 - Springer
Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet,
its deployment in actual cryptographic devices is well known to be challenging, since …

Horizontal side-channel attacks and countermeasures on the ISW masking scheme

A Battistello, JS Coron, E Prouff, R Zeitoun - International Conference on …, 2016 - Springer
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …

Low entropy masking schemes, revisited

V Grosso, FX Standaert, E Prouff - … on Smart Card Research and Advanced …, 2013 - Springer
Abstract Low Entropy Masking Schemes (LEMS) are a recent countermeasure against side-
channel attacks. They aim at reducing the randomness requirements of masking schemes …