In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model is not always convenient, e.g. when combined with formal methods for the verification of cryptographic implementations. Therefore we introduce a new model, the bounded moment model, that formalizes a weaker notion of security order frequently used in the side-channel literature. Interestingly, we prove that probing security for a serial implementation implies bounded moment security for its...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
International audienceIn this paper, we provide a necessary clarification of the good security prope...
International audienceIn this paper, we provide a necessary clarification of the good security prope...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One ...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One ...
Code-based masking schemes have been shown to provide higher theoretical security guarantees than th...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
International audienceIn this paper, we provide a necessary clarification of the good security prope...
International audienceIn this paper, we provide a necessary clarification of the good security prope...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One ...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One ...
Code-based masking schemes have been shown to provide higher theoretical security guarantees than th...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...