Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order
Passive physical attacks, like power analysis, pose a serious threat to the security of
embedded systems and corresponding countermeasures need to be implemented. In this …
embedded systems and corresponding countermeasures need to be implemented. In this …
Masked accelerators and instruction set extensions for post-quantum cryptography
T Fritzmann, M Van Beirendonck… - IACR Transactions …, 2021 - lirias.kuleuven.be
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
Consolidating masking schemes
In this paper we investigate relations between several masking schemes. We show that the
Ishai–Sahai–Wagner private circuits construction is closely related to Threshold …
Ishai–Sahai–Wagner private circuits construction is closely related to Threshold …
[PDF][PDF] Composable masking schemes in the presence of physical defaults & the robust probing model
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …
desirable properties for secure implementations of masking schemes. While tools exist to …
Higher-order threshold implementations
Higher-order differential power analysis attacks are a serious threat for cryptographic
hardware implementations. In particular, glitches in the circuit make it hard to protect the …
hardware implementations. In particular, glitches in the circuit make it hard to protect the …
Parallel implementations of masking schemes and the bounded moment leakage model
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
An efficient side-channel protected AES implementation with arbitrary protection order
Passive physical attacks, like power analysis, pose a serious threat to the security of digital
circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption …
circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption …
ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks
Side-channel analysis and fault-injection attacks are known as major threats to any
cryptographic implementation. Hardening cryptographic implementations with appropriate …
cryptographic implementation. Hardening cryptographic implementations with appropriate …
How fast can higher-order masking be in software?
D Goudarzi, M Rivain - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
Higher-order masking is widely accepted as a sound countermeasure to protect
implementations of blockciphers against side-channel attacks. The main issue while …
implementations of blockciphers against side-channel attacks. The main issue while …