Leakyohm: Secret bits extraction using impedance analysis
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …
researched. Most physical side-channel attacks rely on the unavoidable influence of …
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
Symmetric ciphers operating in (small or mid-size) prime fields have been shown to be
promising candidates to maintain security against low-noise (or even noise-free) side …
promising candidates to maintain security against low-noise (or even noise-free) side …
[PDF][PDF] Compress: Reducing Area and Latency of Masked Pipelined Circuits.
Masking is an effective countermeasure against side-channel attacks. It replaces every logic
gate in a computation by a gadget that performs the operation over secret sharings of the …
gate in a computation by a gadget that performs the operation over secret sharings of the …
Generalized feistel ciphers for efficient prime field masking-full version
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Generalized Feistel Ciphers for Efficient Prime Field Masking
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Compress: Generate small and fast masked pipelined circuits
Masking is an effective countermeasure against side-channel attacks. It replaces every logic
gate in a computation by a gadget that performs the operation over secret sharings of the …
gate in a computation by a gadget that performs the operation over secret sharings of the …
[图书][B] Advances in Cryptology--EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich …
The 7-volume set LNCS 14651-14657 conference volume constitutes the proceedings of the
43rd Annual International Conference on the Theory and Applications of Cryptographic …
43rd Annual International Conference on the Theory and Applications of Cryptographic …
A degree bound for the c-boomerang uniformity of permutation monomials
MJ Steiner - Applicable Algebra in Engineering, Communication …, 2024 - Springer
Let F q be a finite field of characteristic p. In this paper we prove that the c-Boomerang
Uniformity, c≠ 0, for all permutation monomials xd, where d> 1 and p∤ d, is bounded by d 2 …
Uniformity, c≠ 0, for all permutation monomials xd, where d> 1 and p∤ d, is bounded by d 2 …
On the Security of Masked Circuits with Linearizable Leakage
M Plançon - 2024 - research-collection.ethz.ch
Side-channel attacks are a reminder that the gap between theory and practice in
cryptography cannot be neglected. The access to side-channel leakage from insufficiently …
cryptography cannot be neglected. The access to side-channel leakage from insufficiently …
Enhancing Prime+ Probe Attack Detection Using AI and Machine Learning Techniques for Improved Security
I Sharma, SS Ojha - 2023 Global Conference on Information …, 2023 - ieeexplore.ieee.org
This research paper explores the complex area of PRIME+ PROBE attacks, an advanced
kind of cache-based side-channel attack that presents serious security risks. The study …
kind of cache-based side-channel attack that presents serious security risks. The study …