Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
From MaRDI portal
Publication:2010587
DOI10.1007/s00145-018-9277-0zbMath1435.94145OpenAlexW2783032164WikidataQ113906165 ScholiaQ113906165MaRDI QIDQ2010587
Alexandre Duc, Sebastian Faust, François-Xavier Standaert
Publication date: 27 November 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9277-0
Related Items
Towards tight random probing security ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Removing the field size loss from Duc et al.'s conjectured bound for masked encodings ⋮ A key-recovery attack against Mitaka in the \(t\)-probing model ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
Cites Work
- Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2014. 16th international workshop, Busan, South Korea, September 23--26, 2014. Proceedings
- Leakage squeezing: optimal implementation and security evaluation
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Cryptographic hardware and embedded systems -- CHES 2008. 10th international workshop, Washington, D.C., USA, August 10--13, 2008. Proceedings
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Masking proofs are tight and how to exploit it in security evaluations
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Towards easy leakage certification
- Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
- Advances in cryptology -- EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11--15, 2014. Proceedings
- Counting Keys in Parallel After a Side Channel Attack
- Masking with Randomized Look Up Tables
- Semantic Security for the Wiretap Channel
- Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
- Soft Analytical Side-Channel Attacks
- Higher-Order Side Channel Security and Mask Refreshing
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
- Noisy Leakage Revisited
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- The World Is Not Enough: Another Look on Second-Order DPA
- Attack on a Higher-Order Masking of the AES Based on Homographic Functions
- Affine Masking against Higher-Order Side Channel Analysis
- Protecting AES with Shamir’s Secret Sharing Scheme
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
- Higher-Order Masking Schemes for S-Boxes
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Theory and Practice of a Leakage Resilient Masking Scheme
- Security Evaluations beyond Computing Power
- Masking against Side-Channel Attacks: A Formal Security Proof
- Efficient Masked S-Boxes Processing – A Step Forward –
- A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
- Shannon Impossibility, Revisited
- Power Analysis Attacks
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- A Statistical Model for Higher Order DPA on Masked Devices
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- How to Certify the Leakage of a Chip?
- Advances in Cryptology - CRYPTO 2003
- How Far Can We Go Beyond Linear Cryptanalysis?
- Elements of Information Theory
- Topics in Cryptology – CT-RSA 2005
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Topics in Cryptology – CT-RSA 2004
- Unnamed Item
- Unnamed Item
- Unnamed Item