Combined fault and DPA protection for lattice-based cryptography
D Heinz, T Pöppelmann - IEEE Transactions on Computers, 2022 - ieeexplore.ieee.org
The progress on constructing quantum computers and the ongoing standardization of post-
quantum cryptography (PQC) have led to the development and refinement of promising new …
quantum cryptography (PQC) have led to the development and refinement of promising new …
Information leakages in code-based masking: A unified quantification approach
This paper presents a unified approach to quantifying the information leakages in the most
general code-based masking schemes. Specifically, by utilizing a uniform representation …
general code-based masking schemes. Specifically, by utilizing a uniform representation …
On efficient and secure code-based masking: A pragmatic evaluation
Code-based masking is a highly generalized type of masking schemes, which can be
instantiated into specific cases by assigning different encoders. It captivates by its side …
instantiated into specific cases by assigning different encoders. It captivates by its side …
Information leakage in code-based masking: A systematic evaluation by higher-order attacks
Code-based masking is a recent line of research on masking schemes aiming at provably
counteracting side-channel attacks. It generalizes and unifies many masking schemes within …
counteracting side-channel attacks. It generalizes and unifies many masking schemes within …
Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields
Probing physical bits in hardware has compromised cryptographic systems. This work
investigates how to instantiate Shamir's secret sharing so that the physical probes into its …
investigates how to instantiate Shamir's secret sharing so that the physical probes into its …
ISA Extensions of Shuffling Against Side-Channel Attacks
J Zhou, G Qin, L Li, C Guo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Shuffling is a time-randomized countermeasure against side-channel attacks. To achieve
effective protections, shuffling is usually combined with other countermeasures, such as the …
effective protections, shuffling is usually combined with other countermeasures, such as the …
Apt: efficient side-channel analysis framework against inner product masking scheme
Due to its provable security and remarkable device-independence, masking has been
widely accepted as a good algorithmic-level countermeasure against side-channel attacks …
widely accepted as a good algorithmic-level countermeasure against side-channel attacks …
What can information guess?: Towards information leakage quantification in side-channel analysis
W Cheng - 2021 - theses.hal.science
Cryptographic algorithms are nowadays prevalent in establishing secure connectivity in our
digital society. Such computations handle sensitive information like encryption keys, which …
digital society. Such computations handle sensitive information like encryption keys, which …
[PDF][PDF] Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places
Side-channel attacks are significant threats to secret sharing schemes; even a single-bit
probe per share partially reveals an additively shared secret. Shamir's secret-sharing is a …
probe per share partially reveals an additively shared secret. Shamir's secret-sharing is a …
Success-rate Estimation for Side Channel Analysis
S Jordal - 2021 - ntnuopen.ntnu.no
Denne masteroppgaven utforsker teori og teknikker innenfor side-kanals-angrep og side-
kanals-analyse. Først definerer vi den matematiske modellen for lekkasje, og hva angrep …
kanals-analyse. Først definerer vi den matematiske modellen for lekkasje, og hva angrep …