Security Evaluation Against Side-Channel Analysis at Compilation Time
DOI10.1007/978-3-030-36237-9_8zbMath1457.94103OpenAlexW2995784421MaRDI QIDQ3294874
Sylvain Guilley, Jean-Luc Danger, Nicolas Bruneau, Charles Christen, Adrien Facon
Publication date: 29 June 2020
Published in: Algebra, Codes and Cryptology (Search for Journal in Brave)
Full work available at URL: https://hal-cnrs.archives-ouvertes.fr/hal-02915643/file/19_A2C_masking_attack.pdf
compilationside-channel analysisformal analysiscompositional countermeasurecryptographic codeintermediate representation (IR)masking protectionoptimal side-channel attacksstatic single assignment (SSA)Taylor expansion of distinguishers
Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40)
Uses Software
Cites Work
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- Multivariate high-order attacks of shuffled tables recomputation
- Cache-timing attacks still threaten IoT devices
- Masks Will Fall Off
- Soft Analytical Side-Channel Attacks
- Masking Tables—An Underestimated Security Risk
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
- Verified Proofs of Higher-Order Masking
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- PRESENT: An Ultra-Lightweight Block Cipher
- Provably Secure Higher-Order Masking of AES
- A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Selected Areas in Cryptography
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Security Evaluation Against Side-Channel Analysis at Compilation Time