peer reviewedBoolean masking is an effective side-channel countermeasure that consists in splitting each sensitive variable into two or more shares which are carefully manipulated to avoid leakage of the sensitive variable. The best known expressions for Boolean masking of bitwise operations are relatively compact, but even a small improvement of these expressions can significantly reduce the performance penalty of more complex masked operations such as modular addition on Boolean shares or of masked ciphers. In this paper, we present and evaluate new secure expressions for performing bitwise operations on Boolean shares. To this end, we describe an algorithm for efficient search of expressions that have an optimal cost in number of element...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceSide-channel analysis is an important issue for the security of embedded crypt...
Boolean masking is an effective side-channel countermeasure that consists in splitting each sensitiv...
peer reviewedBoolean masking is an effective side-channel countermeasure that consists in splitting ...
The current state of the art of Boolean masking for the modular addition operation in software has a...
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking m...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Embedded devices used in security applications are natural targets for physical attacks. Thus, enhan...
peer reviewedMasking is a widely-used technique to protect block ciphers and other symmetric cryptos...
Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems agains...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceSide-channel analysis is an important issue for the security of embedded crypt...
Boolean masking is an effective side-channel countermeasure that consists in splitting each sensitiv...
peer reviewedBoolean masking is an effective side-channel countermeasure that consists in splitting ...
The current state of the art of Boolean masking for the modular addition operation in software has a...
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking m...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Embedded devices used in security applications are natural targets for physical attacks. Thus, enhan...
peer reviewedMasking is a widely-used technique to protect block ciphers and other symmetric cryptos...
Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems agains...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceSide-channel analysis is an important issue for the security of embedded crypt...