Strong non-interference and type-directed higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - Proceedings of the …, 2016 - dl.acm.org
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …

Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SM Del Pozo… - IACR Transactions on …, 2018 - er.ceres.rub.de
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Hardware private circuits: From trivial composition to full verification

G Cassiers, B Grégoire, I Levi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …

Bitslicing arithmetic/boolean masking conversions for fun and profit: with application to lattice-based kems

O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - er.ceres.rub.de
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …

Trivially and efficiently composing masked gadgets with probe isolating non-interference

G Cassiers, FX Standaert - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We revisit the analysis and design of masked cryptographic implementations to prevent side-
channel attacks. Our starting point is the (known) observation that proving the security of a …

Masking AES with shares in hardware

T De Cnudde, O Reparaz, B Bilgin, S Nikova… - … and Embedded Systems, 2016 - Springer
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …

Formal verification of masked hardware implementations in the presence of glitches

R Bloem, H Groß, R Iusupov, B Könighofer… - Advances in Cryptology …, 2018 - Springer
Masking provides a high level of resistance against side-channel analysis. However, in
practice there are many possible pitfalls when masking schemes are applied, and …

Glitch-resistant masking revisited: Or why proofs in the robust probing model are needed

T Moos, A Moradi, T Schneider… - IACR Transactions on …, 2019 - tosc.iacr.org
Implementing the masking countermeasure in hardware is a delicate task. Various solutions
have been proposed for this purpose over the last years: we focus on Threshold …

Provably secure hardware masking in the transition-and glitch-robust probing model: Better safe than sorry

G Cassiers, FX Standaert - IACR Transactions on Cryptographic …, 2021 - incs.ub.rub.de
There exists many masking schemes to protect implementations of cryptographic operations
against side-channel attacks. It is common practice to analyze the security of these schemes …