the date of receipt and acceptance should be inserted later Abstract In this paper, we evaluate the performances of state-of-the-art higher-order masking schemes for the AES. Doing so, we pay a particular attention to the comparison between specialized solutions introduced ex-clusively as countermeasures against side-channel anal-ysis, and a recent proposal by Roche and Prouff ex-ploiting MultiParty Computation (MPC) techniques. We show that the additional security features this lat-ter scheme provides (e.g. its glitch-freeness) comes at the cost of large performance overheads. We then study how exploiting standard optimization techniques from the MPC literature can be used to reduce this gap. In particular, we show that “packed secret shar...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counte...
In this paper, we evaluate the performances of state-of-the-art higher order masking schemes for the...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
In this paper, we evaluate the performances of state-of-the-art higher-order masking schemes for the...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counte...
In this paper, we evaluate the performances of state-of-the-art higher order masking schemes for the...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
In this paper, we evaluate the performances of state-of-the-art higher-order masking schemes for the...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counte...