Optimal first-order masking with linear and non-linear bijections

H Maghrebi, C Carlet, S Guilley, JL Danger - International Conference on …, 2012 - Springer
Hardware devices can be protected against side-channel attacks by introducing one random
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …

Formal analysis of the entropy/security trade-off in first-order masking countermeasures against side-channel attacks

M Nassar, S Guilley, JL Danger - International Conference on Cryptology …, 2011 - Springer
Several types of countermeasures against side-channel attacks are known. The one called
masking is of great interest since it can be applied to any protocol and/or algorithm, without …

Redundant code-based masking revisited

N Costes, M Stam - IACR Transactions on Cryptographic Hardware …, 2021 - tches.iacr.org
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …

Leakage squeezing: Optimal implementation and security evaluation

C Carlet, JL Danger, S Guilley… - Journal of Mathematical …, 2014 - degruyter.com
Hardware devices can be protected against side-channel attacks by introducing one random
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …

Masking countermeasure

E Prouff - Encyclopedia of Cryptography, Security and Privacy, 2023 - Springer
Masking countermeasures, aka secret sharing or duplication, have been introduced
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …

First-order masking with only two random bits

H Gross, K Stoffelen, L De Meyer, M Krenn… - Proceedings of ACM …, 2019 - dl.acm.org
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …

Re-consolidating first-order masking schemes: Nullifying fresh randomness

AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …

Packed multiplication: how to amortize the cost of side-channel masking?

W Wang, C Guo, FX Standaert, Y Yu… - … Conference on the Theory …, 2020 - Springer
Higher-order masking countermeasures provide strong provable security against side-
channel attacks at the cost of incurring significant overheads, which largely hinders its …

A first-order leak-free masking countermeasure

H Maghrebi, E Prouff, S Guilley, JL Danger - Topics in Cryptology–CT-RSA …, 2012 - Springer
One protection of cryptographic implementations against side-channel attacks is the
masking of the sensitive variables. In this article, we present a first-order masking that does …

Side-channel masking with common shares

W Wang, C Guo, Y Yu, F Ji, Y Su - IACR Transactions on …, 2022 - tches.iacr.org
To counter side-channel attacks, a masking scheme randomly encodes keydependent
variables into several shares, and transforms operations into the masked correspondence …