Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
From MaRDI portal
Publication:2010587
DOI10.1007/S00145-018-9277-0zbMATH Open1435.94145OpenAlexW2783032164WikidataQ113906165 ScholiaQ113906165MaRDI QIDQ2010587FDOQ2010587
Authors: Alexandre Duc, Sebastian Faust, François-Xavier Standaert
Publication date: 27 November 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9277-0
Recommendations
- Making Masking Security Proofs Concrete
- Masking proofs are tight and how to exploit it in security evaluations
- Masking against Side-Channel Attacks: A Formal Security Proof
- Unifying leakage models: from probing attacks to noisy leakage
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
Cites Work
- Elements of Information Theory
- Title not available (Why is that?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- How Far Can We Go Beyond Linear Cryptanalysis?
- Advances in Cryptology - CRYPTO 2003
- Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings
- Title not available (Why is that?)
- Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Secure hardware implementation of nonlinear functions in the presence of glitches
- The world is not enough: another look on second-order DPA
- Power Analysis Attacks
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Towards sound approaches to counteract power-analysis attacks
- Provably secure higher-order masking of AES
- A statistical model for DPA with novel algorithmic confusion analysis
- A comprehensive evaluation of mutual information analysis using a fair evaluation framework
- Topics in Cryptology – CT-RSA 2004
- Theory and practice of a leakage resilient masking scheme
- Topics in Cryptology – CT-RSA 2005
- How to certify the leakage of a chip?
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2014. 16th international workshop, Busan, South Korea, September 23--26, 2014. Proceedings
- Leakage squeezing: optimal implementation and security evaluation
- Affine Masking against Higher-Order Side Channel Analysis
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Soft analytical side-channel attacks
- Higher-order side channel security and mask refreshing
- Higher-order masking schemes for S-boxes
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- A formal study of power variability issues and side-channel attacks for nanoscale devices
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
- Masking against Side-Channel Attacks: A Formal Security Proof
- Unifying leakage models: from probing attacks to noisy leakage.
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Semantic security for the wiretap channel
- Cryptographic hardware and embedded systems -- CHES 2008. 10th international workshop, Washington, D.C., USA, August 10--13, 2008. Proceedings
- Advances in cryptology -- EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11--15, 2014. Proceedings
- Masking proofs are tight and how to exploit it in security evaluations
- Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer
- Efficient masked S-boxes processing -- a step forward
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- Towards easy leakage certification
- Protecting AES with Shamir's secret sharing scheme
- Conversion of security proofs from one leakage model to another: a new issue
- Noisy leakage revisited
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Counting Keys in Parallel After a Side Channel Attack
- A statistical model for higher order DPA on masked devices
- Masking with randomized look up tables. Towards preventing side-channel attacks of all orders
- Simpler and more efficient rank estimation for side-channel security assessment
- Attack on a higher-order masking of the AES based on homographic functions
- An optimal key enumeration algorithm and its application to side-channel attacks
- Shannon impossibility, revisited
Cited In (15)
- Linkable ring signature scheme with stronger security guarantees
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- Masking proofs are tight and how to exploit it in security evaluations
- Leakage certification revisited: bounding model errors in side-channel security evaluations
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
- Removing the field size loss from Duc et al.'s conjectured bound for masked encodings
- From random probing to noisy leakages without field-size dependence
- \textsf{Plover}: masking-friendly hash-and-sign lattice signatures
- Towards tight random probing security
- A key-recovery attack against Mitaka in the \(t\)-probing model
- Raccoon: a masking-friendly signature proven in the probing model
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing
- Leakage certification made simple
- Making Masking Security Proofs Concrete
This page was built for publication: Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010587)