Code-based masking schemes have been shown to provide higher theoretical security guarantees than the Boolean masking. In particular, one interesting feature put forward at CARDIS 2016 and then analyzed at CARDIS 2017 is the so-called security order amplification: under the assumption that the leakage function is linear, it guarantees that an implementation performing only linear operations will have a security order in the bounded moment leakage model larger than d - 1, where d is the number of shares. The main question regarding this feature is its practical relevance. First of all, concrete block ciphers do not only perform linear operations. Second, it may be that actual leakage functions are not perfectly linear (raising questions rega...
International audienceCode-based masking is a highly generalized type of masking schemes, which can ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
International audienceIn this paper, we provide a necessary clarification of the good security prope...
Designers of masking schemes are usually torn between the contradicting goals of maximizing the secu...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Code-based masking is a highly generalized type of masking schemes, which can be instantiated into s...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
In this paper, we provide a necessary clarification of the good security properties that can be obtai...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
International audienceCode-based masking is a highly generalized type of masking schemes, which can ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
International audienceIn this paper, we provide a necessary clarification of the good security prope...
Designers of masking schemes are usually torn between the contradicting goals of maximizing the secu...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Code-based masking is a highly generalized type of masking schemes, which can be instantiated into s...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
In this paper, we provide a necessary clarification of the good security properties that can be obtai...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
International audienceCode-based masking is a highly generalized type of masking schemes, which can ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
International audienceIn this paper, we provide a necessary clarification of the good security prope...