[HTML][HTML] A unified masking approach

H Groß, S Mangard - Journal of cryptographic engineering, 2018 - Springer
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …

Reconciling Masking in Hardware and Software

H Groß, S Mangard - … on Cryptographic Hardware and Embedded Systems, 2017 - Springer
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …

Re-consolidating first-order masking schemes: Nullifying fresh randomness

AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …

Detecting flawed masking schemes with leakage detection tests

O Reparaz - … Encryption: 23rd International Conference, FSE 2016 …, 2016 - Springer
Masking is a popular countermeasure to thwart side-channel attacks on embedded systems.
Many proposed masking schemes, even carrying “security proofs”, are eventually broken …

First-order masking with only two random bits

H Gross, K Stoffelen, L De Meyer, M Krenn… - Proceedings of ACM …, 2019 - dl.acm.org
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …

Randomness generation for secure hardware masking-unrolled trivium to the rescue

G Cassiers, L Masure, C Momin, T Moos… - Cryptology ePrint …, 2023 - eprint.iacr.org
Masking is a prominent strategy to protect cryptographic implementations against side-
channel analysis. Its popularity arises from the exponential security gains that can be …

Low entropy masking schemes, revisited

V Grosso, FX Standaert, E Prouff - … on Smart Card Research and Advanced …, 2013 - Springer
Abstract Low Entropy Masking Schemes (LEMS) are a recent countermeasure against side-
channel attacks. They aim at reducing the randomness requirements of masking schemes …

Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry

G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …

Efficient profiled attacks on masking schemes

L Lerman, O Markowitch - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Side-channel adversaries represent real-world threats against (certified and uncertified)
cryptographic devices. Masking schemes represent prevailing countermeasures to reduce …

Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Passive physical attacks, like power analysis, pose a serious threat to the security of
embedded systems and corresponding countermeasures need to be implemented. In this …