Optimal first-order masking with linear and non-linear bijections
Hardware devices can be protected against side-channel attacks by introducing one random
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …
Formal analysis of the entropy/security trade-off in first-order masking countermeasures against side-channel attacks
Several types of countermeasures against side-channel attacks are known. The one called
masking is of great interest since it can be applied to any protocol and/or algorithm, without …
masking is of great interest since it can be applied to any protocol and/or algorithm, without …
Redundant code-based masking revisited
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
Leakage squeezing: Optimal implementation and security evaluation
Hardware devices can be protected against side-channel attacks by introducing one random
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …
Masking countermeasure
E Prouff - Encyclopedia of Cryptography, Security and Privacy, 2023 - Springer
Masking countermeasures, aka secret sharing or duplication, have been introduced
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …
First-order masking with only two random bits
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …
Even though masking was introduced almost 20 years ago, its efficient implementation …
Re-consolidating first-order masking schemes: Nullifying fresh randomness
AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
Packed multiplication: how to amortize the cost of side-channel masking?
Higher-order masking countermeasures provide strong provable security against side-
channel attacks at the cost of incurring significant overheads, which largely hinders its …
channel attacks at the cost of incurring significant overheads, which largely hinders its …
A first-order leak-free masking countermeasure
One protection of cryptographic implementations against side-channel attacks is the
masking of the sensitive variables. In this article, we present a first-order masking that does …
masking of the sensitive variables. In this article, we present a first-order masking that does …
Side-channel masking with common shares
To counter side-channel attacks, a masking scheme randomly encodes keydependent
variables into several shares, and transforms operations into the masked correspondence …
variables into several shares, and transforms operations into the masked correspondence …