Leakyohm: Secret bits extraction using impedance analysis

SK Monfared, T Mosavirik, S Tajik - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …

Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking

S Faust, L Masure, E Micheli, M Orlt… - … Conference on the Theory …, 2024 - Springer
Symmetric ciphers operating in (small or mid-size) prime fields have been shown to be
promising candidates to maintain security against low-noise (or even noise-free) side …

[PDF][PDF] Compress: Reducing Area and Latency of Masked Pipelined Circuits.

G Cassiers, B Gigerl, S Mangard, C Momin… - IACR Cryptol. ePrint …, 2023 - iacr.steepath.eu
Masking is an effective countermeasure against side-channel attacks. It replaces every logic
gate in a computation by a gadget that performs the operation over secret sharings of the …

Generalized feistel ciphers for efficient prime field masking-full version

L Grassi, L Masure, P Méaux, T Moos… - Cryptology ePrint …, 2024 - eprint.iacr.org
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Generalized Feistel Ciphers for Efficient Prime Field Masking

L Grassi, L Masure, P Méaux, T Moos… - … Conference on the …, 2024 - Springer
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Compress: Generate small and fast masked pipelined circuits

G Cassiers, B Gigerl, S Mangard… - IACR …, 2024 - moving-the-social.ub.rub.de
Masking is an effective countermeasure against side-channel attacks. It replaces every logic
gate in a computation by a gadget that performs the operation over secret sharings of the …

[图书][B] Advances in Cryptology--EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich …

M Joye, G Leander - 2024 - books.google.com
The 7-volume set LNCS 14651-14657 conference volume constitutes the proceedings of the
43rd Annual International Conference on the Theory and Applications of Cryptographic …

A degree bound for the c-boomerang uniformity of permutation monomials

MJ Steiner - Applicable Algebra in Engineering, Communication …, 2024 - Springer
Let F q be a finite field of characteristic p. In this paper we prove that the c-Boomerang
Uniformity, c≠ 0, for all permutation monomials xd, where d> 1 and p∤ d, is bounded by d 2 …

On the Security of Masked Circuits with Linearizable Leakage

M Plançon - 2024 - research-collection.ethz.ch
Side-channel attacks are a reminder that the gap between theory and practice in
cryptography cannot be neglected. The access to side-channel leakage from insufficiently …

Enhancing Prime+ Probe Attack Detection Using AI and Machine Learning Techniques for Improved Security

I Sharma, SS Ojha - 2023 Global Conference on Information …, 2023 - ieeexplore.ieee.org
This research paper explores the complex area of PRIME+ PROBE attacks, an advanced
kind of cache-based side-channel attack that presents serious security risks. The study …