Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking

S Faust, L Masure, E Micheli, M Orlt… - … Conference on the Theory …, 2024 - Springer
Symmetric ciphers operating in (small or mid-size) prime fields have been shown to be
promising candidates to maintain security against low-noise (or even noise-free) side …

High-Performance Design Patterns and File Formats for Side-Channel Analysis

J Bosland, S Ene, P Baumgartner… - IACR Transactions on …, 2024 - tches.iacr.org
Data and instruction dependent power consumption can reveal cryptographic secrets by
means of Side-Channel Analysis (SCA). Consequently, manufacturers and evaluation labs …

Generalized feistel ciphers for efficient prime field masking-full version

L Grassi, L Masure, P Méaux, T Moos… - Cryptology ePrint …, 2024 - eprint.iacr.org
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Exploiting small-norm polynomial multiplication with physical attacks: Application to crystals-Dilithium

O Bronchain, M Azouaoui, M ElGhamrawy… - Cryptology ePrint …, 2023 - eprint.iacr.org
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate
noisy knowledge on secret keys over multiple signatures, finally leading to a full recovery …

Generalized Feistel Ciphers for Efficient Prime Field Masking

L Grassi, L Masure, P Méaux, T Moos… - … Conference on the …, 2024 - Springer
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Bit t-SNI Secure Multiplication Gadget for Inner Product Masking

J Gaspoz, S Dhooghe - IACR Transactions on …, 2025 - moving-the-social.ub.rub.de
Masking is a sound countermeasure to protect against differential power analysis. Since the
work by Balasch et al. in ASIACRYPT 2012, inner product masking has been explored as an …

Efficient Low-Latency Masking of Ascon without Fresh Randomness

SH Prasad, F Mendel, M Schläffer… - Cryptology ePrint …, 2023 - eprint.iacr.org
In this work, we present the first low-latency, second-order masked hardware
implementation of Ascon that requires no fresh randomness using only $ d+ 1$ shares. Our …

Genelle et al. Revisited: Masking an AES Round With Only 4 Secure ANDs

N Belleville - IEEE Embedded Systems Letters, 2024 - ieeexplore.ieee.org
Side-channel attacks are very efficient against AES implementations. In consequence,
countermeasures are needed. Many works studied how to efficiently mask the AES, and in …

[图书][B] Advances in Cryptology--EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich …

M Joye, G Leander - 2024 - books.google.com
The 7-volume set LNCS 14651-14657 conference volume constitutes the proceedings of the
43rd Annual International Conference on the Theory and Applications of Cryptographic …

[PDF][PDF] Securing Micro-controllers against side-channel attacks: evaluation tools and applications

B Udvarhelyi - 2024 - dial.uclouvain.be
Microcontrollers units (MCUs) are nowadays widespread thanks to their versatility and low
cost. On one hand, they are ideal candidates for IoT products. On the other, they are the …