Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Strong non-interference and type-directed higher-order masking
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …
cryptographic material by measuring and analyzing the power consumption of the device on …
Composable masking schemes in the presence of physical defaults & the robust probing model
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …
desirable properties for secure implementations of masking schemes. While tools exist to …
Hardware private circuits: From trivial composition to full verification
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
Bitslicing arithmetic/boolean masking conversions for fun and profit: with application to lattice-based kems
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
Trivially and efficiently composing masked gadgets with probe isolating non-interference
We revisit the analysis and design of masked cryptographic implementations to prevent side-
channel attacks. Our starting point is the (known) observation that proving the security of a …
channel attacks. Our starting point is the (known) observation that proving the security of a …
Masking AES with shares in hardware
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …
against DPA attacks at order d. To this date, this minimal number has only been deployed in …
Parallel implementations of masking schemes and the bounded moment leakage model
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
obtained from parallel implementations of masking schemes. For this purpose, we first argue …
Formal verification of masked hardware implementations in the presence of glitches
Masking provides a high level of resistance against side-channel analysis. However, in
practice there are many possible pitfalls when masking schemes are applied, and …
practice there are many possible pitfalls when masking schemes are applied, and …
Glitch-resistant masking revisited: Or why proofs in the robust probing model are needed
Implementing the masking countermeasure in hardware is a delicate task. Various solutions
have been proposed for this purpose over the last years: we focus on Threshold …
have been proposed for this purpose over the last years: we focus on Threshold …
Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …
against side-channel attacks. It is common practice to analyze the security of these schemes …