Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
Masking kyber: First-and higher-order implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …
been extended to include the side-channel resistance of the candidates. While some …
Composable masking schemes in the presence of physical defaults & the robust probing model
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …
desirable properties for secure implementations of masking schemes. While tools exist to …
Hardware private circuits: From trivial composition to full verification
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon
This work describes the Mitaka signature scheme: a new hash-and-sign signature scheme
over NTRU lattices which can be seen as a variant of NIST finalist Falcon. It achieves …
over NTRU lattices which can be seen as a variant of NIST finalist Falcon. It achieves …
SILVER–statistical independence and leakage verification
Implementing cryptographic functions securely in the presence of physical adversaries is still
a challenge although a lion's share of research in the physical security domain has been put …
a challenge although a lion's share of research in the physical security domain has been put …
Making masking security proofs concrete: or how to evaluate the security of any leaking device
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …
devices and concrete security evaluations with standard side-channel attacks. Our …
Practical CCA2-secure and masked ring-LWE implementation
During the last years public-key encryption schemes based on the hardness of ring-LWE
have gained significant popularity. For real-world security applications assuming strong …
have gained significant popularity. For real-world security applications assuming strong …
Parallel implementations of masking schemes and the bounded moment leakage model
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
obtained from parallel implementations of masking schemes. For this purpose, we first argue …