Consolidating masking schemes
In this paper we investigate relations between several masking schemes. We show that the
Ishai–Sahai–Wagner private circuits construction is closely related to Threshold …
Ishai–Sahai–Wagner private circuits construction is closely related to Threshold …
Strong non-interference and type-directed higher-order masking
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …
cryptographic material by measuring and analyzing the power consumption of the device on …
Composable masking schemes in the presence of physical defaults & the robust probing model
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …
desirable properties for secure implementations of masking schemes. While tools exist to …
Higher-order threshold implementations
Higher-order differential power analysis attacks are a serious threat for cryptographic
hardware implementations. In particular, glitches in the circuit make it hard to protect the …
hardware implementations. In particular, glitches in the circuit make it hard to protect the …
Hardware private circuits: From trivial composition to full verification
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
Making masking security proofs concrete: or how to evaluate the security of any leaking device
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …
devices and concrete security evaluations with standard side-channel attacks. Our …
Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
Masking AES with shares in hardware
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …
against DPA attacks at order d. To this date, this minimal number has only been deployed in …
Verified proofs of higher-order masking
In this paper, we study the problem of automatically verifying higher-order masking
countermeasures. This problem is important in practice, since weaknesses have been …
countermeasures. This problem is important in practice, since weaknesses have been …
On the cost of lazy engineering for masked software implementations
Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet,
its deployment in actual cryptographic devices is well known to be challenging, since …
its deployment in actual cryptographic devices is well known to be challenging, since …