Together with masking, shuffling is one of the most frequently considered solutions to improve the security of small embedded devices against side-channel attacks. In this paper, we provide a comprehensive study of this countermeasure, including improved implementations and a careful information theoretic and security analysis of its different variants. Our analyses lead to important conclusions as they moderate the strong security improvements claimed in previous works. They suggest that simplified versions of shuffling (e.g. using random start indexes) can be significantly weaker than their counterpart using full permutations. We further show with an experimental case study that such simplified versions can be as easy to attack as unprote...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
This papers studies methods to improve the cryptographic quality of random or pseudorandom sequence...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
We revisit the popular adage that side-channel countermeasures must be combined to be efficient, and...
Abstract—Side-channel attacks have been a real threat against many critical embedded systems that re...
Single-trace side-channel attacks are important attack vectors against the security of authenticated...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract. Combining countermeasures is usually assumed to be the best way to protect embedded device...
Hiding countermeasures are the most widely utilized techniques for thwarting side-channel attacks, a...
Modern cryptography relies on the Kerckhoff’s principle which states that everything about a crypto-...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
The use of random permutation tables as a side-channel attack countermeasure was recently proposed b...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
This papers studies methods to improve the cryptographic quality of random or pseudorandom sequence...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
We revisit the popular adage that side-channel countermeasures must be combined to be efficient, and...
Abstract—Side-channel attacks have been a real threat against many critical embedded systems that re...
Single-trace side-channel attacks are important attack vectors against the security of authenticated...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract. Combining countermeasures is usually assumed to be the best way to protect embedded device...
Hiding countermeasures are the most widely utilized techniques for thwarting side-channel attacks, a...
Modern cryptography relies on the Kerckhoff’s principle which states that everything about a crypto-...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
The use of random permutation tables as a side-channel attack countermeasure was recently proposed b...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Since 1996, numerous attacks have been shown to uncover secrets by exploiting a device's physical be...
This papers studies methods to improve the cryptographic quality of random or pseudorandom sequence...