A first-order leak-free masking countermeasure
From MaRDI portal
Publication:2890002
DOI10.1007/978-3-642-27954-6_10zbMATH Open1292.94110OpenAlexW7685012MaRDI QIDQ2890002FDOQ2890002
Authors: Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-27954-6_10
Recommendations
- Masking against Side-Channel Attacks: A Formal Security Proof
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- Theory and practice of a leakage resilient masking scheme
- Higher-order side channel security and mask refreshing
- Higher-order masking schemes for S-boxes
Cites Work
- Vectorial Boolean functions for cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Statistical Analysis of Second Order Differential Power Analysis
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- The world is not enough: another look on second-order DPA
- Mutual Information Analysis: How, When and Why?
- Towards sound approaches to counteract power-analysis attacks
- Provably secure higher-order masking of AES
- Title not available (Why is that?)
- Revisiting Higher-Order DPA Attacks:
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
Cited In (16)
- Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
- Multivariate high-order attacks of shuffled tables recomputation
- Leakage squeezing of order two
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- On the practical security of a leakage resilient masking scheme
- Synthesis of masking countermeasures against side channel attacks
- Leakage squeezing: optimal implementation and security evaluation
- Detecting flawed masking schemes with leakage detection tests
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Theory and practice of a leakage resilient masking scheme
- Conversion of security proofs from one leakage model to another: a new issue
- Detecting hidden leakages
- On the security of RSM -- presenting 5 first -- and second-order attacks
- Bitsliced masking and ARM: friends or foes?
- Threshold implementation in software. Case study of PRESENT
This page was built for publication: A first-order leak-free masking countermeasure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2890002)