Provably Secure Higher-Order Masking of AES

From MaRDI portal
Publication:3583477

DOI10.1007/978-3-642-15031-9_28zbMath1321.94087OpenAlexW2161740631MaRDI QIDQ3583477

Matthieu Rivain, Emmanuel Prouff

Publication date: 17 August 2010

Published in: Cryptographic Hardware and Embedded Systems, CHES 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-15031-9_28




Related Items (66)

Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended versionA First-Order Leak-Free Masking CountermeasureSecure wire shuffling in the probing modelCorrelation power analysis and higher-order masking implementation of WAGEGeneralizing statistical ineffective fault attacks in the spirit of side-channel attacksAlgebraic Decomposition for Probing SecurityConsolidating Masking SchemesThe wonderful world of global random oraclesHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}Complementing Feistel CiphersHigher-Order Side Channel Security and Mask RefreshingMasking Tables—An Underestimated Security RiskNear Collision Attack on the Grain v1 Stream CipherThreshold implementations of small S-boxesMasking and leakage-resilient primitives: one, the other(s) or both?Effective and efficient masking with low noise using small-Mersenne-prime ciphersProvable secure software masking in the real-worldTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsUnknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRFProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelSecure and efficient software masking on superscalar pipelined processorsDynamic random probing expansion with quasi linear asymptotic complexityDetecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacksBridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsUnifying freedom and separation for tight probing-secure compositionKVaC: key-value commitments for blockchains and beyondPacked multiplication: how to amortize the cost of side-channel masking?An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderTime-Memory Trade-Offs for Side-Channel Resistant Implementations of Block CiphersUnifying leakage models: from probing attacks to noisy leakageSecurity Evaluation Against Side-Channel Analysis at Compilation TimeReducing Randomness Complexity of Mask Refreshing AlgorithmSecure Multiplication for Bitslice Higher-Order Masking: Optimisation and ComparisonVectorizing Higher-Order MaskingSCATTER: A New Dimension in Side-ChannelThreshold Implementation in SoftwareCompositional Synthesis of Leakage Resilient ProgramsDetecting Flawed Masking Schemes with Leakage Detection TestsThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksМаскирование ГОСТ 28147-89 для защиты от атак по побочным каналамMontgomery’s Trick and Fast Implementation of Masked AESImproving the security and efficiency of block ciphers based on LS-designsStatistical properties of side-channel and fault injection attacks using coding theoryMultivariate high-order attacks of shuffled tables recomputationParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelHow Fast Can Higher-Order Masking Be in Software?Codes for Side-Channel Attacks and ProtectionsMasking the GLP lattice-based signature scheme at any orderMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONEfficient Leakage Resilient Circuit CompilersLeakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeUnconditionally secure computation against low-complexity leakagePolynomial Evaluation and Side Channel AnalysisRelated-Key Attack on Full-Round PICAROConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresCorrection to: ``Unconditionally secure computation against low-complexity leakageAffine Masking against Higher-Order Side Channel AnalysisTornado: automatic generation of probing-secure masked bitsliced implementationsSide-channel masking with pseudo-random generatorOn the power of expansion: more efficient constructions in the random probing modelLeakage resilient value comparison with application to message authenticationFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel AttacksRandom probing security: verification, composition, expansion and new constructionsA VLSI implementation of an SM4 algorithm resistant to power analysis




This page was built for publication: Provably Secure Higher-Order Masking of AES