Horizontal side-channel attacks and countermeasures on the ISW masking scheme
From MaRDI portal
Publication:1695964
DOI10.1007/978-3-662-53140-2_2zbMath1380.94071OpenAlexW2479727864MaRDI QIDQ1695964
Rina Zeitoun, Jean-Sébastien Coron, Alberto Battistello, Emmanuel Prouff
Publication date: 14 February 2018
Full work available at URL: https://doi.org/10.1007/978-3-662-53140-2_2
Related Items (21)
Towards tight random probing security ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Combined fault and leakage resilience: composability, constructions and compiler ⋮ Dynamic random probing expansion with quasi linear asymptotic complexity ⋮ Unifying freedom and separation for tight probing-secure composition ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Packed multiplication: how to amortize the cost of side-channel masking? ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison ⋮ Vectorizing Higher-Order Masking ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Tornado: automatic generation of probing-secure masked bitsliced implementations ⋮ On the power of expansion: more efficient constructions in the random probing model ⋮ Random probing security: verification, composition, expansion and new constructions ⋮ Custom instruction support for modular defense against side-channel and fault attacks
This page was built for publication: Horizontal side-channel attacks and countermeasures on the ISW masking scheme