Masking countermeasures against HO-DPA: security evaluation and enhancement by specific mask encodings
H Maghrebi - 2012 - pastel.hal.science
Side channel attacks take advantage of the fact that the power consumption of a
cryptographic device depends on the internally used secret key. A very common …
cryptographic device depends on the internally used secret key. A very common …
Provably Secure Countermeasures against Side-channel Attacks
PK Vadnala - 2015 - orbilu.uni.lu
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms
leak information about the secret key. In power analysis attacks, the observable leakage is …
leak information about the secret key. In power analysis attacks, the observable leakage is …
Redundant code-based masking revisited
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
Masking countermeasure
E Prouff - Encyclopedia of Cryptography, Security and Privacy, 2023 - Springer
Masking countermeasures, aka secret sharing or duplication, have been introduced
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …
simultaneously in Goubin and Patarin (1999) and Chari et al.(1999) to defeat side-channel …
Reconciling Masking in Hardware and Software
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
[HTML][HTML] A unified masking approach
The continually growing number of security-related autonomous devices requires efficient
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides …
Function masking: A new countermeasure against side channel attack
T Kim, S Ahn, S Lee, D Choi - … Workshop, WISA 2014, Jeju Island, Korea …, 2015 - Springer
Masking schemes have been developed to implement secure cryptographic algorithms
against Side Channel Analysis (SCA) attacks. Technically, the first-order masking method is …
against Side Channel Analysis (SCA) attacks. Technically, the first-order masking method is …
Re-consolidating first-order masking schemes: Nullifying fresh randomness
AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …
Optimal first-order masking with linear and non-linear bijections
Hardware devices can be protected against side-channel attacks by introducing one random
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …
[PDF][PDF] Composable and efficient masking schemes for side-channel secure implementations.
G Cassiers - 2022 - dial.uclouvain.be
Modern cryptography has been widely deployed in the last decades, allowing any
computing device to secure its communications. Facing the strength of the cryptographic …
computing device to secure its communications. Facing the strength of the cryptographic …