Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing

J Béguinot, W Cheng, S Guilley, O Rioul - Annual International Cryptology …, 2024 - Springer
Masking is one of the most popular countermeasures to side-channel attacks, because it can
offer provable security. However, depending on the adversary's model, useful security …

Ironmask: Versatile verification of masking security

S Belaïd, D Mercadier, M Rivain… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
This paper introduces lronMask, a new versatile verification tool for masking security.
lronMask is the first to offer the verification of standard simulation-based security notions in …

Security closure of physical layouts ICCAD special session paper

J Knechtel, J Gopinath, J Bhandari… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Computer-aided design (CAD) tools traditionally optimize for power, performance, and area
(PPA). However, given a vast number of hardware security threats, we call for secure-by …

Prouff and Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model

L Masure, FX Standaert - Annual International Cryptology Conference, 2023 - Springer
Masking is a counter-measure that can be incorporated to software and hardware
implementations of block ciphers to provably secure them against side-channel attacks. The …

An Algebraic Approach for Evaluating Random Probing Security With Application to AES

V Jahandideh, B Mennink, L Batina - IACR Transactions on …, 2024 - tches.iacr.org
We employ an algebraic approach to estimate the success rate of a sidechannel adversary
attacking secrets of a masked circuit within the Random Probing Model (RPM), where …

[PDF][PDF] Towards Achieving Provable Side-Channel Security in Practice.

S Belaïd, G Cassiers, C Mutschler, M Rivain… - IACR Cryptol. ePrint …, 2023 - iacr.steepath.eu
Physical side-channel attacks are powerful attacks that exploit a device's physical
emanations to break the security of cryptographic implementations. Many countermeasures …

Unifying freedom and separation for tight probing-secure composition

S Belaïd, G Cassiers, M Rivain, AR Taleb - Annual International …, 2023 - Springer
The masking countermeasure is often analyzed in the probing model. Proving the probing
security of large circuits at high masking orders is achieved by composing gadgets that …

A methodology to achieve provable side-channel security in real-world implementations

S Belaïd, G Cassiers, C Mutschler, M Rivain… - Cryptology ePrint …, 2023 - eprint.iacr.org
Physical side-channel attacks exploit a device's emanations to compromise the security of
cryptographic implementations. Many countermeasures have been proposed against these …

Provable Secure Parallel Gadgets

F Berti, S Faust, M Orlt - IACR Transactions on Cryptographic …, 2023 - tches.iacr.org
Side-channel attacks are a fundamental threat to the security of cryptographic
implementations. One of the most prominent countermeasures against side-channel attacks …

From random probing to noisy leakages without field-size dependence

G Brian, S Dziembowski, S Faust - … on the Theory and Applications of …, 2024 - Springer
Side channel attacks are devastating attacks targeting cryptographic implementations. To
protect against these attacks, various countermeasures have been proposed–in particular …