Horizontal side-channel attacks and countermeasures on the ISW masking scheme

From MaRDI portal
Revision as of 06:48, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1695964


DOI10.1007/978-3-662-53140-2_2zbMath1380.94071OpenAlexW2479727864MaRDI QIDQ1695964

Rina Zeitoun, Jean-Sébastien Coron, Alberto Battistello, Emmanuel Prouff

Publication date: 14 February 2018

Full work available at URL: https://doi.org/10.1007/978-3-662-53140-2_2



Related Items

Towards tight random probing security, \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations, On the worst-case side-channel security of ECC point randomization in embedded devices, Effective and efficient masking with low noise using small-Mersenne-prime ciphers, Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model, Combined fault and leakage resilience: composability, constructions and compiler, Dynamic random probing expansion with quasi linear asymptotic complexity, Unifying freedom and separation for tight probing-secure composition, Beyond birthday bound secure fresh rekeying: application to authenticated encryption, Packed multiplication: how to amortize the cost of side-channel masking?, Security Evaluation Against Side-Channel Analysis at Compilation Time, Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison, Vectorizing Higher-Order Masking, Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version, Unconditionally secure computation against low-complexity leakage, Correction to: ``Unconditionally secure computation against low-complexity leakage, Tornado: automatic generation of probing-secure masked bitsliced implementations, On the power of expansion: more efficient constructions in the random probing model, Random probing security: verification, composition, expansion and new constructions, Custom instruction support for modular defense against side-channel and fault attacks