Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs
O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
Sok: Design tools for side-channel-aware implementations
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …
with its physical environment have proven to be a severe threat to devices' security …
Rosita: Towards automatic elimination of power-analysis leakage in ciphers
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …
serious security threat. While many ciphers' implementations employ masking techniques to …
Miracle: Micro-architectural leakage evaluation
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …
evaluating the micro-architectural leakage, based on power consumption, which stems from …
Ironmask: Versatile verification of masking security
This paper introduces lronMask, a new versatile verification tool for masking security.
lronMask is the first to offer the verification of standard simulation-based security notions in …
lronMask is the first to offer the verification of standard simulation-based security notions in …
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
J Zeitschner, A Moradi - IACR Transactions on Cryptographic …, 2024 - tches.iacr.org
Software solutions to address computational challenges are ubiquitous in our daily lives.
One specific application area where software is often used is in embedded systems, which …
One specific application area where software is often used is in embedded systems, which …
VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
J Richter-Brockmann, J Feldtkeller, P Sasdrich… - Cryptology ePrint …, 2022 - eprint.iacr.org
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …
Analysis, are considered among the most powerful threats against physical cryptographic …
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …
cryptographic algorithms against power side-channel attacks, the design of which however …
A survey of recent developments in testability, safety and security of risc-v processors
With the continued success of the open RISC-V architecture, practical deployment of RISC-V
processors necessitates an in-depth consideration of their testability, safety and security …
processors necessitates an in-depth consideration of their testability, safety and security …
Deep learning gradient visualization-based pre-silicon side-channel leakage location
Y Li, J Zhu, Z Liu, M Tang, S Ren - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While side-channel attacks (SCAs) have become a significant threat to cryptographic
algorithms, masking is considered as an effective countermeasure against SCAs. On the …
algorithms, masking is considered as an effective countermeasure against SCAs. On the …