Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
Symmetric ciphers operating in (small or mid-size) prime fields have been shown to be
promising candidates to maintain security against low-noise (or even noise-free) side …
promising candidates to maintain security against low-noise (or even noise-free) side …
High-Performance Design Patterns and File Formats for Side-Channel Analysis
J Bosland, S Ene, P Baumgartner… - IACR Transactions on …, 2024 - tches.iacr.org
Data and instruction dependent power consumption can reveal cryptographic secrets by
means of Side-Channel Analysis (SCA). Consequently, manufacturers and evaluation labs …
means of Side-Channel Analysis (SCA). Consequently, manufacturers and evaluation labs …
Generalized feistel ciphers for efficient prime field masking-full version
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Exploiting small-norm polynomial multiplication with physical attacks: Application to crystals-Dilithium
O Bronchain, M Azouaoui, M ElGhamrawy… - Cryptology ePrint …, 2023 - eprint.iacr.org
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate
noisy knowledge on secret keys over multiple signatures, finally leading to a full recovery …
noisy knowledge on secret keys over multiple signatures, finally leading to a full recovery …
Generalized Feistel Ciphers for Efficient Prime Field Masking
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
J Gaspoz, S Dhooghe - IACR Transactions on …, 2025 - moving-the-social.ub.rub.de
Masking is a sound countermeasure to protect against differential power analysis. Since the
work by Balasch et al. in ASIACRYPT 2012, inner product masking has been explored as an …
work by Balasch et al. in ASIACRYPT 2012, inner product masking has been explored as an …
Efficient Low-Latency Masking of Ascon without Fresh Randomness
SH Prasad, F Mendel, M Schläffer… - Cryptology ePrint …, 2023 - eprint.iacr.org
In this work, we present the first low-latency, second-order masked hardware
implementation of Ascon that requires no fresh randomness using only $ d+ 1$ shares. Our …
implementation of Ascon that requires no fresh randomness using only $ d+ 1$ shares. Our …
Genelle et al. Revisited: Masking an AES Round With Only 4 Secure ANDs
N Belleville - IEEE Embedded Systems Letters, 2024 - ieeexplore.ieee.org
Side-channel attacks are very efficient against AES implementations. In consequence,
countermeasures are needed. Many works studied how to efficiently mask the AES, and in …
countermeasures are needed. Many works studied how to efficiently mask the AES, and in …
[图书][B] Advances in Cryptology--EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich …
The 7-volume set LNCS 14651-14657 conference volume constitutes the proceedings of the
43rd Annual International Conference on the Theory and Applications of Cryptographic …
43rd Annual International Conference on the Theory and Applications of Cryptographic …
[PDF][PDF] Securing Micro-controllers against side-channel attacks: evaluation tools and applications
B Udvarhelyi - 2024 - dial.uclouvain.be
Microcontrollers units (MCUs) are nowadays widespread thanks to their versatility and low
cost. On one hand, they are ideal candidates for IoT products. On the other, they are the …
cost. On one hand, they are ideal candidates for IoT products. On the other, they are the …