Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SM Del Pozo… - IACR Transactions on …, 2018 - er.ceres.rub.de
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …

Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks

J Bringer, C Carlet, H Chabanne, S Guilley… - … on Information Security …, 2014 - Springer
Secure elements, such as smartcards or trusted platform modules (TPMs), must be protected
against implementation-level attacks. Those include side-channel and fault injection attacks …

Side-channel countermeasures' dissection and the limits of closed source security evaluations

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
We take advantage of a recently published open source implementation of the AES
protected with a mix of countermeasures against side-channel attacks to discuss both the …

Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks

Z Liu, P Longa, GCCF Pereira… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This work deals with the energy-efficient, high-speed and high-security implementation of
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …

Novel hybrid CMOS/memristor implementation of the AES algorithm robust against differential power analysis attack

M Masoumi - IEEE Transactions on Circuits and Systems II …, 2019 - ieeexplore.ieee.org
Memory resistor or memristor is the fourth fundamental circuit element that has attained
considerable attention due to its unique characteristics and possible extensive applications …

Prouff and Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model

L Masure, FX Standaert - Annual International Cryptology Conference, 2023 - Springer
Masking is a counter-measure that can be incorporated to software and hardware
implementations of block ciphers to provably secure them against side-channel attacks. The …

Analysis and improvements of the DPA contest v4 implementation

S Bhasin, N Bruneau, JL Danger, S Guilley… - Security, Privacy, and …, 2014 - Springer
DPA Contest is an international framework which allows researchers to compare their
attacks under a common setting. The latest version of DPA Contest proposes a software …

Detecting hidden leakages

A Moradi, S Guilley, A Heuser - … 2014, Lausanne, Switzerland, June 10-13 …, 2014 - Springer
Reducing the entropy of the mask is a technique which has been proposed to mitigate the
high performance overhead of masked software implementations of symmetric block …

Don't learn what you already know: scheme-aware modeling for profiling side-channel analysis against masking

L Masure, V Cristiani, M Lecomte… - IACR Transactions on …, 2023 - metalla.org
Over the past few years, deep-learning-based attacks have emerged as a de facto standard,
thanks to their ability to break implementations of cryptographic primitives without pre …