Consolidating masking schemes

O Reparaz, B Bilgin, S Nikova, B Gierlichs… - Advances in Cryptology …, 2015 - Springer
In this paper we investigate relations between several masking schemes. We show that the
Ishai–Sahai–Wagner private circuits construction is closely related to Threshold …

Strong non-interference and type-directed higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - Proceedings of the …, 2016 - dl.acm.org
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …

Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SM Del Pozo… - IACR Transactions on …, 2018 - er.ceres.rub.de
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Higher-order threshold implementations

B Bilgin, B Gierlichs, S Nikova, V Nikov… - Advances in Cryptology …, 2014 - Springer
Higher-order differential power analysis attacks are a serious threat for cryptographic
hardware implementations. In particular, glitches in the circuit make it hard to protect the …

Hardware private circuits: From trivial composition to full verification

G Cassiers, B Grégoire, I Levi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …

Making masking security proofs concrete: or how to evaluate the security of any leaking device

A Duc, S Faust, FX Standaert - … on the Theory and Applications of …, 2015 - Springer
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …

Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs

O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …

Masking AES with shares in hardware

T De Cnudde, O Reparaz, B Bilgin, S Nikova… - … and Embedded Systems, 2016 - Springer
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …

Verified proofs of higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - … Conference on the …, 2015 - Springer
In this paper, we study the problem of automatically verifying higher-order masking
countermeasures. This problem is important in practice, since weaknesses have been …

On the cost of lazy engineering for masked software implementations

J Balasch, B Gierlichs, V Grosso, O Reparaz… - Smart Card Research …, 2015 - Springer
Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet,
its deployment in actual cryptographic devices is well known to be challenging, since …