Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
Hardware private circuits: From trivial composition to full verification
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
SILVER–statistical independence and leakage verification
Implementing cryptographic functions securely in the presence of physical adversaries is still
a challenge although a lion's share of research in the physical security domain has been put …
a challenge although a lion's share of research in the physical security domain has been put …
Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter
O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …
masked software implementations of the AES and the (candidate to the NIST Lightweight …
Trivially and efficiently composing masked gadgets with probe isolating non-interference
G Cassiers, FX Standaert - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We revisit the analysis and design of masked cryptographic implementations to prevent side-
channel attacks. Our starting point is the (known) observation that proving the security of a …
channel attacks. Our starting point is the (known) observation that proving the security of a …
Tornado: Automatic generation of probing-secure masked bitsliced implementations
Cryptographic implementations deployed in real world devices often aim at (provable)
security against the powerful class of side-channel attacks while keeping reasonable …
security against the powerful class of side-channel attacks while keeping reasonable …
maskverif: Automated verification of higher-order masking in presence of physical defaults
Power and electromagnetic based side-channel attacks are serious threats against the
security of cryptographic embedded devices. In order to mitigate these attacks …
security of cryptographic embedded devices. In order to mitigate these attacks …
A survey of leakage-resilient cryptography
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …
adversarial attack model to cover side-channel attacks and has built schemes to provably …
Miracle: Micro-architectural leakage evaluation
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …
evaluating the micro-architectural leakage, based on power consumption, which stems from …