Making Masking Security Proofs Concrete
From MaRDI portal
Publication:2948337
DOI10.1007/978-3-662-46800-5_16zbMATH Open1370.94508DBLPconf/eurocrypt/DucFS15OpenAlexW2241259389WikidataQ58764999 ScholiaQ58764999MaRDI QIDQ2948337FDOQ2948337
Authors: Alexandre Duc, Sebastian Faust, François-Xavier Standaert
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: http://infoscience.epfl.ch/record/207735
Recommendations
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Masking proofs are tight and how to exploit it in security evaluations
- Provable secure software masking in the real-world
- Masking against Side-Channel Attacks: A Formal Security Proof
- Selected Areas in Cryptography
- On the practical security of a leakage resilient masking scheme
- Provably secure higher-order masking of AES
- Verified Proofs of Higher-Order Masking
- Consolidating masking schemes
Cited In (28)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Optimal Amplification of Noisy Leakages
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Codes for Side-Channel Attacks and Protections
- How to fool a black box machine learning based side-channel security evaluation
- Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
- Masking proofs are tight and how to exploit it in security evaluations
- Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
- Mask compression: high-order masking on memory-constrained devices
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Verified Proofs of Higher-Order Masking
- Ridge-Based Profiled Differential Power Analysis
- Fast verification of masking schemes in characteristic two
- Systematic study of decryption and re-encryption leakage: the case of Kyber
- Removing the field size loss from Duc et al.'s conjectured bound for masked encodings
- Generalized Feistel ciphers for efficient prime field masking
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing
- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- Vectorizing Higher-Order Masking
This page was built for publication: Making Masking Security Proofs Concrete
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948337)