In this paper, we evaluate the performances of state-of-the-art higher-order masking schemes for the AES. Doing so, we pay a particular attention to the comparison between specialized solutions introduced exclusively as countermeasures against side-channel analysis, and a recent proposal by Roche and Prouff exploiting MultiParty Computation (MPC) techniques. We show that the additional security features this latter scheme provides (e.g. its glitch-freeness) comes at the cost of large performance overheads. We then study how exploiting standard optimization techniques from the MPC literature can be used to reduce this gap. In particular, we show that “packed secret sharing” based on a modified multiplication algorithm can speed up MPC-based ...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though mas...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
In this paper, we evaluate the performances of state-of-the-art higher order masking schemes for the...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
the date of receipt and acceptance should be inserted later Abstract In this paper, we evaluate the ...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though mas...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
In this paper, we evaluate the performances of state-of-the-art higher order masking schemes for the...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
Abstract. In this paper, we evaluate the performances of state-of-the-art higher-order masking schem...
the date of receipt and acceptance should be inserted later Abstract In this paper, we evaluate the ...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
International audienceCryptographic algorithms embedded on physical devices are particularly vulnera...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
Code-based masking is a very general type of masking scheme that covers Boolean masking, inner produ...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though mas...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...