Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Leakage assessment methodology: A clear roadmap for side-channel evaluations

T Schneider, A Moradi - … Hardware and Embedded Systems--CHES 2015 …, 2015 - Springer
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …

Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Passive physical attacks, like power analysis, pose a serious threat to the security of
embedded systems and corresponding countermeasures need to be implemented. In this …

Consolidating masking schemes

O Reparaz, B Bilgin, S Nikova, B Gierlichs… - Advances in Cryptology …, 2015 - Springer
In this paper we investigate relations between several masking schemes. We show that the
Ishai–Sahai–Wagner private circuits construction is closely related to Threshold …

Strong non-interference and type-directed higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - Proceedings of the …, 2016 - dl.acm.org
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …

[PDF][PDF] Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SMD Pozo, C Paglialonga… - 2018 - repository.ubn.ru.nl
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Hardware private circuits: From trivial composition to full verification

G Cassiers, B Grégoire, I Levi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …

How (not) to use welch's t-test in side-channel security evaluations

FX Standaert - Smart Card Research and Advanced Applications: 17th …, 2019 - Springer
Abstract The Test Vector Leakage Assessment (TVLA) methodology is a qualitative tool
relying on Welch's T-test to assess the security of cryptographic implementations against …

Masking AES with shares in hardware

T De Cnudde, O Reparaz, B Bilgin, S Nikova… - … and Embedded Systems, 2016 - Springer
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …