Composable masking schemes in the presence of physical defaults & the robust probing model
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …
desirable properties for secure implementations of masking schemes. While tools exist to …
Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter
O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …
masked software implementations of the AES and the (candidate to the NIST Lightweight …
Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks
Secure elements, such as smartcards or trusted platform modules (TPMs), must be protected
against implementation-level attacks. Those include side-channel and fault injection attacks …
against implementation-level attacks. Those include side-channel and fault injection attacks …
Side-channel countermeasures' dissection and the limits of closed source security evaluations
O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
We take advantage of a recently published open source implementation of the AES
protected with a mix of countermeasures against side-channel attacks to discuss both the …
protected with a mix of countermeasures against side-channel attacks to discuss both the …
Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
This work deals with the energy-efficient, high-speed and high-security implementation of
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …
Novel hybrid CMOS/memristor implementation of the AES algorithm robust against differential power analysis attack
M Masoumi - IEEE Transactions on Circuits and Systems II …, 2019 - ieeexplore.ieee.org
Memory resistor or memristor is the fourth fundamental circuit element that has attained
considerable attention due to its unique characteristics and possible extensive applications …
considerable attention due to its unique characteristics and possible extensive applications …
Prouff and Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model
L Masure, FX Standaert - Annual International Cryptology Conference, 2023 - Springer
Masking is a counter-measure that can be incorporated to software and hardware
implementations of block ciphers to provably secure them against side-channel attacks. The …
implementations of block ciphers to provably secure them against side-channel attacks. The …
Analysis and improvements of the DPA contest v4 implementation
DPA Contest is an international framework which allows researchers to compare their
attacks under a common setting. The latest version of DPA Contest proposes a software …
attacks under a common setting. The latest version of DPA Contest proposes a software …
Detecting hidden leakages
Reducing the entropy of the mask is a technique which has been proposed to mitigate the
high performance overhead of masked software implementations of symmetric block …
high performance overhead of masked software implementations of symmetric block …
Don't learn what you already know: scheme-aware modeling for profiling side-channel analysis against masking
Over the past few years, deep-learning-based attacks have emerged as a de facto standard,
thanks to their ability to break implementations of cryptographic primitives without pre …
thanks to their ability to break implementations of cryptographic primitives without pre …