Provably Secure Higher-Order Masking of AES
From MaRDI portal
Publication:3583477
DOI10.1007/978-3-642-15031-9_28zbMath1321.94087OpenAlexW2161740631MaRDI QIDQ3583477
Matthieu Rivain, Emmanuel Prouff
Publication date: 17 August 2010
Published in: Cryptographic Hardware and Embedded Systems, CHES 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-15031-9_28
Related Items (66)
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version ⋮ A First-Order Leak-Free Masking Countermeasure ⋮ Secure wire shuffling in the probing model ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks ⋮ Algebraic Decomposition for Probing Security ⋮ Consolidating Masking Schemes ⋮ The wonderful world of global random oracles ⋮ Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data ⋮ \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} ⋮ Complementing Feistel Ciphers ⋮ Higher-Order Side Channel Security and Mask Refreshing ⋮ Masking Tables—An Underestimated Security Risk ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ Threshold implementations of small S-boxes ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Provable secure software masking in the real-world ⋮ Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Secure and efficient software masking on superscalar pipelined processors ⋮ Dynamic random probing expansion with quasi linear asymptotic complexity ⋮ Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Unifying freedom and separation for tight probing-secure composition ⋮ KVaC: key-value commitments for blockchains and beyond ⋮ Packed multiplication: how to amortize the cost of side-channel masking? ⋮ An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order ⋮ Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ Reducing Randomness Complexity of Mask Refreshing Algorithm ⋮ Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison ⋮ Vectorizing Higher-Order Masking ⋮ SCATTER: A New Dimension in Side-Channel ⋮ Threshold Implementation in Software ⋮ Compositional Synthesis of Leakage Resilient Programs ⋮ Detecting Flawed Masking Schemes with Leakage Detection Tests ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам ⋮ Montgomery’s Trick and Fast Implementation of Masked AES ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Multivariate high-order attacks of shuffled tables recomputation ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ Codes for Side-Channel Attacks and Protections ⋮ Masking the GLP lattice-based signature scheme at any order ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON ⋮ Efficient Leakage Resilient Circuit Compilers ⋮ Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ Related-Key Attack on Full-Round PICARO ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Affine Masking against Higher-Order Side Channel Analysis ⋮ Tornado: automatic generation of probing-secure masked bitsliced implementations ⋮ Side-channel masking with pseudo-random generator ⋮ On the power of expansion: more efficient constructions in the random probing model ⋮ Leakage resilient value comparison with application to message authentication ⋮ Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks ⋮ Random probing security: verification, composition, expansion and new constructions ⋮ A VLSI implementation of an SM4 algorithm resistant to power analysis
This page was built for publication: Provably Secure Higher-Order Masking of AES