A masked ring-LWE implementation
Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem.
In this paper, we present a masked ring-LWE decryption implementation resistant to first …
In this paper, we present a masked ring-LWE decryption implementation resistant to first …
Detecting hidden leakages
Reducing the entropy of the mask is a technique which has been proposed to mitigate the
high performance overhead of masked software implementations of symmetric block …
high performance overhead of masked software implementations of symmetric block …
Masking ring-LWE
In this paper, we propose a masking scheme to protect ring-LWE decryption from first-order
side-channel attacks. In an unprotected ring-LWE decryption, the recovered plaintext is …
side-channel attacks. In an unprotected ring-LWE decryption, the recovered plaintext is …
Beyond the limits of DPA: combined side-channel collision attacks
A Bogdanov, I Kizhvatov - IEEE Transactions on Computers, 2011 - ieeexplore.ieee.org
The problem of extracting the highest possible amount of key-related information using the
lowest possible number of measurements is one of the central questions in side-channel …
lowest possible number of measurements is one of the central questions in side-channel …
Masking tables—an underestimated security risk
The literature on side-channel analysis describes numerous masking schemes designed to
protect block ciphers at the implementation level. Such masking schemes typically require …
protect block ciphers at the implementation level. Such masking schemes typically require …
Statistical properties of side-channel and fault injection attacks using coding theory
Naïve implementation of block ciphers are subject to side-channel and fault injection attacks.
To deceive side-channel attacks and to detect fault injection attacks, the designer inserts …
To deceive side-channel attacks and to detect fault injection attacks, the designer inserts …
A highly efficient and secure hardware implementation of the advanced encryption standard
M Masoumi - Journal of Information Security and Applications, 2019 - Elsevier
A highly efficient and power analysis attack robust architecture for hardware implementation
of the advanced encryption standard algorithm (AES) is presented. By choosing a correct …
of the advanced encryption standard algorithm (AES) is presented. By choosing a correct …
Multivariate high-order attacks of shuffled tables recomputation
Masking schemes based on tables recomputation are classical countermeasures against
high-order side-channel attacks. Still, they are known to be attackable at order d in the case …
high-order side-channel attacks. Still, they are known to be attackable at order d in the case …
First-order masking with only two random bits
Masking is the best-researched countermeasure against side-channel analysis attacks.
Even though masking was introduced almost 20 years ago, its efficient implementation …
Even though masking was introduced almost 20 years ago, its efficient implementation …
Principles on the security of AES against first and second-order differential power analysis
J Lu, J Pan, J den Hartog - … Conference, ACNS 2010, Beijing, China, June …, 2010 - Springer
Abstract The Advanced Encryption Standard (AES) is a 128-bit block cipher that is currently
being widely used in smartcards. Differential Power Analysis (DPA) is a powerful technique …
being widely used in smartcards. Differential Power Analysis (DPA) is a powerful technique …