We improve the state-of-the-art masking schemes in two important directions. First, we propose a new masked multiplication algorithm that satisfies a recently introduced notion called Probe-Isolating Non-Interference (PINI). It captures a sufficient requirement for designing masked implementations in a trivial way, by combining PINI multiplications and linear operations performed share by share. Our improved algorithm has the best reported randomness complexity for large security orders (while the previous PINI multiplication was best for small orders). Second, we analyze the security of most existing multiplication algorithms in the literature against so-called horizontal attacks, which aim to reduce the noise of the actual leakages measur...
Masking is the central topic of this thesis based on publications. Masking is a technique that allow...
In this paper, we evaluate the performances of state-of-the-art higher-order masking schemes for the...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
International audienceWe revisit the matrix model for non-interference (NI) probing security of mask...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceA common countermeasure against side-channel attacks consists in using the mas...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
In this paper, we evaluate the performances of state-of-the-art higher order masking schemes for the...
Masking is the central topic of this thesis based on publications. Masking is a technique that allow...
In this paper, we evaluate the performances of state-of-the-art higher-order masking schemes for the...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
International audienceWe revisit the matrix model for non-interference (NI) probing security of mask...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceA common countermeasure against side-channel attacks consists in using the mas...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
In this paper, we evaluate the performances of state-of-the-art higher order masking schemes for the...
Masking is the central topic of this thesis based on publications. Masking is a technique that allow...
In this paper, we evaluate the performances of state-of-the-art higher-order masking schemes for the...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...