Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

From MaRDI portal
Publication:5738889

DOI10.1007/978-3-319-56620-7_19zbMath1411.94050OpenAlexW2612816951MaRDI QIDQ5738889

Pierre-Yves Strub, Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert

Publication date: 13 June 2017

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://hal.inria.fr/hal-01414009/file/parallel_masking_4.pdf




Related Items (max. 100)

Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsProving SIFA protection of masked redundant circuitsSpin me right round rotational symmetry for FPGA-specific AES: extended version\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionSecure and efficient software masking on superscalar pipelined processorsLearning with physical rounding for linear and quadratic leakage functionsUnifying freedom and separation for tight probing-secure compositionSILVER -- statistical independence and leakage verificationPacked multiplication: how to amortize the cost of side-channel masking?Security Evaluation Against Side-Channel Analysis at Compilation TimeSecure Multiplication for Bitslice Higher-Order Masking: Optimisation and ComparisonVectorizing Higher-Order MaskingStatistical properties of side-channel and fault injection attacks using coding theoryParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionFast verification of masking schemes in characteristic twoOn the power of expansion: more efficient constructions in the random probing modelRandom probing security: verification, composition, expansion and new constructionsCustom instruction support for modular defense against side-channel and fault attacks



Cites Work


This page was built for publication: Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model