Making Masking Security Proofs Concrete

From MaRDI portal
Publication:2948337

DOI10.1007/978-3-662-46800-5_16zbMath1370.94508OpenAlexW2241259389WikidataQ58764999 ScholiaQ58764999MaRDI QIDQ2948337

Alexandre Duc, Sebastian Faust, François-Xavier Standaert

Publication date: 30 September 2015

Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: http://infoscience.epfl.ch/record/207735




Related Items (20)

How to fool a black box machine learning based side-channel security evaluationScore-Based vs. Probability-Based Enumeration – A Cautionary NoteSecurity analysis of deterministic re-keying with masking and shuffling: application to ISAPSystematic study of decryption and re-encryption leakage: the case of KyberRemoving the field size loss from Duc et al.'s conjectured bound for masked encodings\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionCharacterisation and Estimation of the Key Rank Distribution in the Context of Side Channel EvaluationsTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsRidge-Based Profiled Differential Power AnalysisVectorizing Higher-Order MaskingThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelCodes for Side-Channel Attacks and ProtectionsOptimal Amplification of Noisy LeakagesFast verification of masking schemes in characteristic twoDifferential Bias Attack for Block Cipher Under Randomized Leakage with Key EnumerationTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle




This page was built for publication: Making Masking Security Proofs Concrete