[PDF][PDF] Scalib: a side-channel analysis library
Side-channel attacks exploit unintended leakage from an electronic device in order to
retrieve secret data. In particular, attacks exploiting physical side-channels such as power …
retrieve secret data. In particular, attacks exploiting physical side-channels such as power …
Glitch-Stop** Circuits: Hardware Secure Masking without Registers
Z Zhang, S Petkova-Nikova, V Nikov - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Masking is one of the most popular countermeasures to protect implementations against
power and electromagnetic side-channel attacks because it offers provable security …
power and electromagnetic side-channel attacks because it offers provable security …
A memory hierarchy protected against side-channel attacks
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the
most valuable element to protect against information theft. Many first-order side-channel …
most valuable element to protect against information theft. Many first-order side-channel …
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as
power analysis. Masking is a popular countermeasure against such attacks, which works by …
power analysis. Masking is a popular countermeasure against such attacks, which works by …
Generalized feistel ciphers for efficient prime field masking-full version
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon
Low-latency masked hardware implementations are known to be a difficult challenge. On the
one hand, the propagation of glitches can falsify their independence assumption (that is …
one hand, the propagation of glitches can falsify their independence assumption (that is …
Generalized Feistel Ciphers for Efficient Prime Field Masking
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Robust but Relaxed Probing Model
Masking has become a widely applied and heavily researched method to protect
cryptographic implementations against Side-Channel Analysis (SCA) attacks. The success …
cryptographic implementations against Side-Channel Analysis (SCA) attacks. The success …
A New Fast and Side-Channel Resistant AES Hardware Architecture
M Macchetti, H Pelletier, C Groux - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In this paper we present a novel architecture for a high-speed AES crypto core which is
resistant against first-order side channel attacks; our design combines Boolean masking …
resistant against first-order side channel attacks; our design combines Boolean masking …
Low-latency masking with arbitrary protection order based on click elements
M Simões, L Bossuet, N Bruneau… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Masking is the main countermeasure against side-channel attacks due to its sound formal
proof of security and the scalability of its protection parameters. However, effective masking …
proof of security and the scalability of its protection parameters. However, effective masking …