Masking against Side-Channel Attacks: A Formal Security Proof

From MaRDI portal
Publication:4924408

DOI10.1007/978-3-642-38348-9_9zbMath1306.94087OpenAlexW191000419MaRDI QIDQ4924408

Matthieu Rivain, Emmanuel Prouff

Publication date: 31 May 2013

Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_9




Related Items (32)

Towards tight random probing securitySecure Computation from Leaky Correlated RandomnessAlgebraic Decomposition for Probing SecurityHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataRevisiting mutual information analysis: multidimensionality, neural estimation and optimality proofsMasking and leakage-resilient primitives: one, the other(s) or both?Effective and efficient masking with low noise using small-Mersenne-prime ciphersA Better Chain Rule for HILL Pseudoentropy - Beyond Bounded LeakageSystematic study of decryption and re-encryption leakage: the case of KyberRemoving the field size loss from Duc et al.'s conjectured bound for masked encodingsSecret can be public: low-memory AEAD mode for high-order maskingGeneralized probabilistic satisfiability and applications to modelling attackers with side-channel capabilitiesProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelUnifying freedom and separation for tight probing-secure compositionKVaC: key-value commitments for blockchains and beyondBeyond birthday bound secure fresh rekeying: application to authenticated encryptionPacked multiplication: how to amortize the cost of side-channel masking?Unifying leakage models: from probing attacks to noisy leakageSecure Multiplication for Bitslice Higher-Order Masking: Optimisation and ComparisonVectorizing Higher-Order MaskingCompositional Synthesis of Leakage Resilient ProgramsParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelHow Fast Can Higher-Order Masking Be in Software?Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionEfficient Leakage Resilient Circuit CompilersRobust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksOptimal Amplification of Noisy LeakagesPolynomial Evaluation and Side Channel AnalysisOn the power of expansion: more efficient constructions in the random probing modelThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsRandom probing security: verification, composition, expansion and new constructions




This page was built for publication: Masking against Side-Channel Attacks: A Formal Security Proof