Combined fault and DPA protection for lattice-based cryptography

D Heinz, T Pöppelmann - IEEE Transactions on Computers, 2022 - ieeexplore.ieee.org
The progress on constructing quantum computers and the ongoing standardization of post-
quantum cryptography (PQC) have led to the development and refinement of promising new …

Information leakages in code-based masking: A unified quantification approach

W Cheng, S Guilley, C Carlet, JL Danger… - Cryptology ePrint …, 2021 - eprint.iacr.org
This paper presents a unified approach to quantifying the information leakages in the most
general code-based masking schemes. Specifically, by utilizing a uniform representation …

On efficient and secure code-based masking: A pragmatic evaluation

Q Wu, W Cheng, S Guilley, F Zhang… - IACR Transactions on …, 2022 - tches.iacr.org
Code-based masking is a highly generalized type of masking schemes, which can be
instantiated into specific cases by assigning different encoders. It captivates by its side …

Information leakage in code-based masking: A systematic evaluation by higher-order attacks

W Cheng, S Guilley, JL Danger - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Code-based masking is a recent line of research on masking schemes aiming at provably
counteracting side-channel attacks. It generalizes and unifies many masking schemes within …

Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields

HK Maji, HH Nguyen, A Paskin-Cherniavsky… - … Conference on the …, 2024 - Springer
Probing physical bits in hardware has compromised cryptographic systems. This work
investigates how to instantiate Shamir's secret sharing so that the physical probes into its …

ISA Extensions of Shuffling Against Side-Channel Attacks

J Zhou, G Qin, L Li, C Guo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Shuffling is a time-randomized countermeasure against side-channel attacks. To achieve
effective protections, shuffling is usually combined with other countermeasures, such as the …

Apt: efficient side-channel analysis framework against inner product masking scheme

J Ming, W Cheng, Y Zhou, H Li - 2021 IEEE 39th International …, 2021 - ieeexplore.ieee.org
Due to its provable security and remarkable device-independence, masking has been
widely accepted as a good algorithmic-level countermeasure against side-channel attacks …

What can information guess?: Towards information leakage quantification in side-channel analysis

W Cheng - 2021 - theses.hal.science
Cryptographic algorithms are nowadays prevalent in establishing secure connectivity in our
digital society. Such computations handle sensitive information like encryption keys, which …

[PDF][PDF] Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places

J Hwang, HK Maji, HH Nguyen, X Ye - cs.purdue.edu
Side-channel attacks are significant threats to secret sharing schemes; even a single-bit
probe per share partially reveals an additively shared secret. Shamir's secret-sharing is a …

Success-rate Estimation for Side Channel Analysis

S Jordal - 2021 - ntnuopen.ntnu.no
Denne masteroppgaven utforsker teori og teknikker innenfor side-kanals-angrep og side-
kanals-analyse. Først definerer vi den matematiske modellen for lekkasje, og hva angrep …