Re-consolidating first-order masking schemes: Nullifying fresh randomness
AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
Second-order SCA security with almost no fresh randomness
AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Masking schemes are among the most popular countermeasures against Side-Channel
Analysis (SCA) attacks. Realization of masked implementations on hardware faces several …
Analysis (SCA) attacks. Realization of masked implementations on hardware faces several …
Reconciling Masking in Hardware and Software
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
A unified masking approach
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
First-order masking with only two random bits
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …
Even though masking was introduced almost 20 years ago, its efficient implementation …
Randomness generation for secure hardware masking-unrolled trivium to the rescue
Masking is a prominent strategy to protect cryptographic implementations against side-
channel analysis. Its popularity arises from the exponential security gains that can be …
channel analysis. Its popularity arises from the exponential security gains that can be …
Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry
G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …
against side-channel attacks. It is common practice to analyze the security of these schemes …
On the cost of lazy engineering for masked software implementations
Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet,
its deployment in actual cryptographic devices is well known to be challenging, since …
its deployment in actual cryptographic devices is well known to be challenging, since …
Horizontal side-channel attacks and countermeasures on the ISW masking scheme
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further …
Low entropy masking schemes, revisited
Abstract Low Entropy Masking Schemes (LEMS) are a recent countermeasure against side-
channel attacks. They aim at reducing the randomness requirements of masking schemes …
channel attacks. They aim at reducing the randomness requirements of masking schemes …