Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
From MaRDI portal
Publication:5738889
DOI10.1007/978-3-319-56620-7_19zbMath1411.94050OpenAlexW2612816951MaRDI QIDQ5738889
Pierre-Yves Strub, Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-01414009/file/parallel_masking_4.pdf
Related Items (max. 100)
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ Proving SIFA protection of masked redundant circuits ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Secure and efficient software masking on superscalar pipelined processors ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Unifying freedom and separation for tight probing-secure composition ⋮ SILVER -- statistical independence and leakage verification ⋮ Packed multiplication: how to amortize the cost of side-channel masking? ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison ⋮ Vectorizing Higher-Order Masking ⋮ Statistical properties of side-channel and fault injection attacks using coding theory ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Fast verification of masking schemes in characteristic two ⋮ On the power of expansion: more efficient constructions in the random probing model ⋮ Random probing security: verification, composition, expansion and new constructions ⋮ Custom instruction support for modular defense against side-channel and fault attacks
Cites Work
- Unnamed Item
- Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part I
- Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I
- Cryptographic hardware and embedded systems -- CHES 2015. 17th international workshop, Saint-Malo, France, September 13--16, 2015. Proceedings
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- Cryptographic hardware and embedded systems -- CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17--19, 2016. Proceedings
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Towards easy leakage certification
- Masking AES with \(d+1\) shares in hardware
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- Statistical Tools Flavor Side-Channel Collision Attacks
- Synthesis of Masking Countermeasures against Side Channel Attacks
- Higher-Order Threshold Implementations
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- Making Masking Security Proofs Concrete
- Verified Proofs of Higher-Order Masking
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- The World Is Not Enough: Another Look on Second-Order DPA
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Consolidating Masking Schemes
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Provably Secure Higher-Order Masking of AES
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- Statistical Analysis of Second Order Differential Power Analysis
- A More Efficient AES Threshold Implementation
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2005
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate
- Randomness Complexity of Private Circuits for Multiplication
This page was built for publication: Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model