Masking is the central topic of this thesis based on publications. Masking is a technique that allows the secure execution of cryptographic algorithms in untrusted environments. More concretely, masking provides security guarantees even if an adversary observes side-channel leakage. We first propose a methodology to attack masked implementations more quickly. Our method is relevant in practice since it allows to carry out attacks that before took months in days. The proposed method first locates the relevant time samples for an attack and then only attacks those. For this purpose we rely on versatile information-theoretic tools. The second selected paper in this thesis deals with Differential Power Analysis, masking and bit-slicing at ver...
Abstract. Instantiations of the McEliece cryptosystem which are considered computationally secure ev...
Abstract. We demonstrate that masking a block cipher implementation does not sufficiently improve it...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Masking is the central topic of this thesis based on publications. Masking is a technique that allow...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Abstract—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the ...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
Abstract. Instantiations of the McEliece cryptosystem which are considered computationally secure ev...
Abstract. We demonstrate that masking a block cipher implementation does not sufficiently improve it...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Masking is the central topic of this thesis based on publications. Masking is a technique that allow...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Abstract—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the ...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
Abstract. Instantiations of the McEliece cryptosystem which are considered computationally secure ev...
Abstract. We demonstrate that masking a block cipher implementation does not sufficiently improve it...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...