Side-channel attacks are an important class of cryptanalytic techniques against cryptographic' implementations and masking is a frequently considered solution to improve the resistance of a cryptographic implementation against side-channel attacks. The security of higher-order Boolean masking schemes in various contexts is analysed. The results presented are 2-fold. First, the definitions of higher-order side-channel attacks with the related security notions are formalised and certain security weaknesses in recently proposed masking schemes are put forward. Second, the conditions upon which a substitution box in a block cipher can be perfectly masked by Boolean values in order to counteract side-channel attacks are investigated. That is, ca...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
Abstract. Side-channel attacks are an important class of cryptanalytic tech-niques against cryptogra...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side channel attacks take advantage of the fact that the power consumption of a cryptographic device...
Abstract. Masking is a widely used countermeasure to protect block cipher implementations against si...
Abstract. Masking is a widely used countermeasure to protect block cipher implementations against si...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak info...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...
Abstract. Side-channel attacks are an important class of cryptanalytic tech-niques against cryptogra...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side channel attacks take advantage of the fact that the power consumption of a cryptographic device...
Abstract. Masking is a widely used countermeasure to protect block cipher implementations against si...
Abstract. Masking is a widely used countermeasure to protect block cipher implementations against si...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak info...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
International audienceThis article revisits side-channel analysis from the standpoint of coding theo...