A masked ring-LWE implementation

O Reparaz, S Sinha Roy, F Vercauteren… - … and Embedded Systems, 2015 - Springer
Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem.
In this paper, we present a masked ring-LWE decryption implementation resistant to first …

Detecting hidden leakages

A Moradi, S Guilley, A Heuser - … 2014, Lausanne, Switzerland, June 10-13 …, 2014 - Springer
Reducing the entropy of the mask is a technique which has been proposed to mitigate the
high performance overhead of masked software implementations of symmetric block …

Masking ring-LWE

O Reparaz, SS Roy, R De Clercq… - Journal of Cryptographic …, 2016 - Springer
In this paper, we propose a masking scheme to protect ring-LWE decryption from first-order
side-channel attacks. In an unprotected ring-LWE decryption, the recovered plaintext is …

Beyond the limits of DPA: combined side-channel collision attacks

A Bogdanov, I Kizhvatov - IEEE Transactions on Computers, 2011 - ieeexplore.ieee.org
The problem of extracting the highest possible amount of key-related information using the
lowest possible number of measurements is one of the central questions in side-channel …

Masking tables—an underestimated security risk

M Tunstall, C Whitnall, E Oswald - … , FSE 2013, Singapore, March 11-13 …, 2014 - Springer
The literature on side-channel analysis describes numerous masking schemes designed to
protect block ciphers at the implementation level. Such masking schemes typically require …

Statistical properties of side-channel and fault injection attacks using coding theory

C Carlet, S Guilley - Cryptography and Communications, 2018 - Springer
Naïve implementation of block ciphers are subject to side-channel and fault injection attacks.
To deceive side-channel attacks and to detect fault injection attacks, the designer inserts …

A highly efficient and secure hardware implementation of the advanced encryption standard

M Masoumi - Journal of Information Security and Applications, 2019 - Elsevier
A highly efficient and power analysis attack robust architecture for hardware implementation
of the advanced encryption standard algorithm (AES) is presented. By choosing a correct …

Multivariate high-order attacks of shuffled tables recomputation

N Bruneau, S Guilley, Z Najm, Y Teglia - Journal of Cryptology, 2018 - Springer
Masking schemes based on tables recomputation are classical countermeasures against
high-order side-channel attacks. Still, they are known to be attackable at order d in the case …

First-order masking with only two random bits

H Gross, K Stoffelen, L De Meyer, M Krenn… - Proceedings of ACM …, 2019 - dl.acm.org
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …

Principles on the security of AES against first and second-order differential power analysis

J Lu, J Pan, J den Hartog - … Conference, ACNS 2010, Beijing, China, June …, 2010 - Springer
Abstract The Advanced Encryption Standard (AES) is a 128-bit block cipher that is currently
being widely used in smartcards. Differential Power Analysis (DPA) is a powerful technique …