[HTML][HTML] A unified masking approach
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
Reconciling Masking in Hardware and Software
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
Re-consolidating first-order masking schemes: Nullifying fresh randomness
AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
Detecting flawed masking schemes with leakage detection tests
O Reparaz - … Encryption: 23rd International Conference, FSE 2016 …, 2016 - Springer
Masking is a popular countermeasure to thwart side-channel attacks on embedded systems.
Many proposed masking schemes, even carrying “security proofs”, are eventually broken …
Many proposed masking schemes, even carrying “security proofs”, are eventually broken …
First-order masking with only two random bits
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …
Even though masking was introduced almost 20 years ago, its efficient implementation …
Randomness generation for secure hardware masking-unrolled trivium to the rescue
Masking is a prominent strategy to protect cryptographic implementations against side-
channel analysis. Its popularity arises from the exponential security gains that can be …
channel analysis. Its popularity arises from the exponential security gains that can be …
Low entropy masking schemes, revisited
Abstract Low Entropy Masking Schemes (LEMS) are a recent countermeasure against side-
channel attacks. They aim at reducing the randomness requirements of masking schemes …
channel attacks. They aim at reducing the randomness requirements of masking schemes …
Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry
G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …
against side-channel attacks. It is common practice to analyze the security of these schemes …
Efficient profiled attacks on masking schemes
L Lerman, O Markowitch - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Side-channel adversaries represent real-world threats against (certified and uncertified)
cryptographic devices. Masking schemes represent prevailing countermeasures to reduce …
cryptographic devices. Masking schemes represent prevailing countermeasures to reduce …
Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order
Passive physical attacks, like power analysis, pose a serious threat to the security of
embedded systems and corresponding countermeasures need to be implemented. In this …
embedded systems and corresponding countermeasures need to be implemented. In this …