We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show that this countermeasure prevents side-channel attacks of all orders during the execution of a protected block cipher implementation, given that some secure precomputations can be performed. Second, we show that taking advantage of the linear diffusion layer in modern block ciphers allows deriving clear arguments for the security of their implementations, that can be easily interpreted by hardware designers. Masking with randomized look up tables allows fast execution times but its memory requirements are high and, depending on the block cipher to protect, can be p...
Lookup-table based side-channel countermeasure is the prime choice for masked S-box software impleme...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Abstract. Side-channel attacks are an important class of cryptanalytic tech-niques against cryptogra...
Securing cryptographic implementations against side-channel attacks is one of the most important cha...
International audienceSecuring cryptographic implementations against side-channel attacks is one of ...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Code-based masking schemes have been shown to provide higher theoretical security guarantees than th...
Lookup-table based side-channel countermeasure is the prime choice for masked S-box software impleme...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Abstract. Side-channel attacks are an important class of cryptanalytic tech-niques against cryptogra...
Securing cryptographic implementations against side-channel attacks is one of the most important cha...
International audienceSecuring cryptographic implementations against side-channel attacks is one of ...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Code-based masking schemes have been shown to provide higher theoretical security guarantees than th...
Lookup-table based side-channel countermeasure is the prime choice for masked S-box software impleme...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...