Tornado: automatic generation of probing-secure masked bitsliced implementations
From MaRDI portal
Publication:2055659
DOI10.1007/978-3-030-45727-3_11OpenAlexW3022378354MaRDI QIDQ2055659
Pierre-Évariste Dagand, Matthieu Rivain, Sonia Belaïd, Raphaël Wintersdorff, Darius Mercadier
Publication date: 1 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-45727-3_11
Related Items (7)
Handcrafting: improving automated masking in hardware with manual optimizations ⋮ Secure and efficient software masking on superscalar pipelined processors ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Fast verification of masking schemes in characteristic two ⋮ Random probing security: verification, composition, expansion and new constructions ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Tornado
Uses Software
Cites Work
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- All the AES you need on Cortex-M3 and M4
- Tight private circuits: achieving probing security with the least refreshing
- Efficient cryptography on the RISC-V architecture
- Higher-Order Side Channel Security and Mask Refreshing
- Algebraic Decomposition for Probing Security
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Provably Secure Higher-Order Masking of AES
- A fast new DES implementation in software
- Optimizing S-Box Implementations for Several Criteria Using SAT Solvers
- Higher-Order Masking Schemes for S-Boxes
- Very High Order Masking: Efficient Implementation and Security Evaluation
- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures
- Advances in Cryptology - CRYPTO 2003
- How Fast Can Higher-Order Masking Be in Software?
This page was built for publication: Tornado: automatic generation of probing-secure masked bitsliced implementations