Horizontal side-channel attacks and countermeasures on the ISW masking scheme

From MaRDI portal
Publication:1695964

DOI10.1007/978-3-662-53140-2_2zbMath1380.94071OpenAlexW2479727864MaRDI QIDQ1695964

Rina Zeitoun, Jean-Sébastien Coron, Alberto Battistello, Emmanuel Prouff

Publication date: 14 February 2018

Full work available at URL: https://doi.org/10.1007/978-3-662-53140-2_2




Related Items (21)

Towards tight random probing security\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsOn the worst-case side-channel security of ECC point randomization in embedded devicesEffective and efficient masking with low noise using small-Mersenne-prime ciphersProuff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelCombined fault and leakage resilience: composability, constructions and compilerDynamic random probing expansion with quasi linear asymptotic complexityUnifying freedom and separation for tight probing-secure compositionBeyond birthday bound secure fresh rekeying: application to authenticated encryptionPacked multiplication: how to amortize the cost of side-channel masking?Security Evaluation Against Side-Channel Analysis at Compilation TimeSecure Multiplication for Bitslice Higher-Order Masking: Optimisation and ComparisonVectorizing Higher-Order MaskingParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionUnconditionally secure computation against low-complexity leakageCorrection to: ``Unconditionally secure computation against low-complexity leakageTornado: automatic generation of probing-secure masked bitsliced implementationsOn the power of expansion: more efficient constructions in the random probing modelRandom probing security: verification, composition, expansion and new constructionsCustom instruction support for modular defense against side-channel and fault attacks




This page was built for publication: Horizontal side-channel attacks and countermeasures on the ISW masking scheme