Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs

R Ueno, K Xagawa, Y Tanaka, A Ito… - IACR Transactions on …, 2022 - tches.iacr.org
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM)
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …

PROLEAD: A probing-based hardware leakage detection tool

N Müller, A Moradi - IACR Transactions on Cryptographic Hardware …, 2022 - tches.iacr.org
Abstract Even today, Side-Channel Analysis attacks pose a serious threat to the security of
cryptographic implementations fabricated with low-power and nanoscale feature …

Automated generation of masked hardware

D Knichel, A Moradi, N Müller, P Sasdrich - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Masking has been recognized as a sound and secure countermeasure for cryptographic
implementations, protecting against physical side-channel attacks. Even though many …

Low-latency hardware private circuits

D Knichel, A Moradi - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Over the last years, the rise of the IoT, and the connection of mobile-and hence physically
accessible-devices, immensely enhanced the demand for fast and secure hardware …

Modulonet: Neural networks meet modular arithmetic for efficient hardware masking

A Dubey, A Ahmad, MA Pasha… - IACR Transactions on …, 2022 - tches.iacr.org
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-
channel attacks on inference engines are becoming a major threat. Indeed, several recent …

Second-order low-randomness d+ 1 hardware sharing of the AES

S Dhooghe, AR Shahmirzadi, A Moradi - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
In this paper, we introduce a second-order masking of the AES using the minimal number of
shares and a total of 1268 bits of randomness including the sharing of the plaintext and key …

Cryptanalysis of efficient masked ciphers: applications to low latency

T Beyne, S Dhooghe, A Moradi… - IACR Transactions on …, 2022 - tches.iacr.org
This work introduces second-order masked implementation of LED, Midori, Skinny, and
Prince ciphers which do not require fresh masks to be updated at every clock cycle. The …

New first-order secure AES performance records

AR Shahmirzadi, D Božilov, A Moradi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Being based on a sound theoretical basis, masking schemes are commonly applied to
protect cryptographic implementations against Side-Channel Analysis (SCA) attacks …

Threshold implementations in software: Micro-architectural leakages in algorithms

J Gaspoz, S Dhooghe - IACR Transactions on Cryptographic …, 2023 - tches.iacr.org
This paper provides necessary properties to algorithmically secure firstorder maskings in
scalar micro-architectures. The security notions of threshold implementations are adapted …

Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners

A Covic, F Ganji, D Forte - arXiv preprint arXiv:2106.12714, 2021 - arxiv.org
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …