Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking
From MaRDI portal
Publication:6637529
DOI10.1007/978-3-031-58737-5_12MaRDI QIDQ6637529FDOQ6637529
Authors: Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert
Publication date: 13 November 2024
Recommendations
- Generalized Feistel ciphers for efficient prime field masking
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- From random probing to noisy leakages without field-size dependence
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Unifying leakage models: from probing attacks to noisy leakage
Cites Work
- Concentration inequalities. A nonasymptotic theory of independence
- Title not available (Why is that?)
- Statistical Analysis of Second Order Differential Power Analysis
- Advances in Cryptology - CRYPTO 2003
- Probabilities on a Compact Group
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Asymptotic Methods in Enumeration
- Power Analysis Attacks
- Towards sound approaches to counteract power-analysis attacks
- Title not available (Why is that?)
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Masking against Side-Channel Attacks: A Formal Security Proof
- Unifying leakage models: from probing attacks to noisy leakage.
- Optimal amplification of noisy leakages
- Unifying leakage models on a Rényi day
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- Masking proofs are tight and how to exploit it in security evaluations
- Making Masking Security Proofs Concrete
- Adaptive chosen-message side-channel attacks
- Circuit compilers with \(O(1/\log (n))\) leakage rate
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- On the local leakage resilience of linear secret sharing schemes
- Constructing locally leakage-resilient linear secret-sharing schemes
- On the local leakage resilience of linear secret sharing schemes
- Finding significant Fourier coefficients: clarifications, simplifications, applications and limitations
- Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Removing the field size loss from Duc et al.'s conjectured bound for masked encodings
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
- Tight estimate of the local leakage resilience of the additive secret-sharing scheme \& its consequences
Cited In (1)
This page was built for publication: Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6637529)