Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM)
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …
PROLEAD: A probing-based hardware leakage detection tool
Abstract Even today, Side-Channel Analysis attacks pose a serious threat to the security of
cryptographic implementations fabricated with low-power and nanoscale feature …
cryptographic implementations fabricated with low-power and nanoscale feature …
Automated generation of masked hardware
Masking has been recognized as a sound and secure countermeasure for cryptographic
implementations, protecting against physical side-channel attacks. Even though many …
implementations, protecting against physical side-channel attacks. Even though many …
Low-latency hardware private circuits
Over the last years, the rise of the IoT, and the connection of mobile-and hence physically
accessible-devices, immensely enhanced the demand for fast and secure hardware …
accessible-devices, immensely enhanced the demand for fast and secure hardware …
Modulonet: Neural networks meet modular arithmetic for efficient hardware masking
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-
channel attacks on inference engines are becoming a major threat. Indeed, several recent …
channel attacks on inference engines are becoming a major threat. Indeed, several recent …
Second-order low-randomness d+ 1 hardware sharing of the AES
In this paper, we introduce a second-order masking of the AES using the minimal number of
shares and a total of 1268 bits of randomness including the sharing of the plaintext and key …
shares and a total of 1268 bits of randomness including the sharing of the plaintext and key …
Cryptanalysis of efficient masked ciphers: applications to low latency
This work introduces second-order masked implementation of LED, Midori, Skinny, and
Prince ciphers which do not require fresh masks to be updated at every clock cycle. The …
Prince ciphers which do not require fresh masks to be updated at every clock cycle. The …
New first-order secure AES performance records
AR Shahmirzadi, D Božilov, A Moradi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Being based on a sound theoretical basis, masking schemes are commonly applied to
protect cryptographic implementations against Side-Channel Analysis (SCA) attacks …
protect cryptographic implementations against Side-Channel Analysis (SCA) attacks …
Threshold implementations in software: Micro-architectural leakages in algorithms
J Gaspoz, S Dhooghe - IACR Transactions on Cryptographic …, 2023 - tches.iacr.org
This paper provides necessary properties to algorithmically secure firstorder maskings in
scalar micro-architectures. The security notions of threshold implementations are adapted …
scalar micro-architectures. The security notions of threshold implementations are adapted …
Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …
a major threat to the security of cryptographic schemes. This has elevated the need for …