We revisit the analysis and design of masked cryptographic implementations to prevent side-channel attacks. Our starting point is the (known) observation that proving the security of a higher-order masked block cipher exhaustively requires unrealistic computing power. As a result, a natural strategy is to split algorithms in smaller parts (or gadgets), with as main objectives to enable both simple composition (as initiated by Barthe et al. at CCS 2016) and efficient implementations. We argue that existing composition strategies allow either trivial composition with significant overheads or optimized composition with more analysis efforts. As a result, we first introduce a new definition of Probe Isolating Non-Interference (PINI) that allows...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
The probing security model is widely used to formally prove the security of masking schemes. Wheneve...
The probing security model is widely used to formally prove the security of masking schemes. Wheneve...
International audienceWe revisit the matrix model for non-interference (NI) probing security of mask...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Masking has been recognized as a sound and secure countermeasure for cryptographic implementations, ...
We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
The probing security model is widely used to formally prove the security of masking schemes. Wheneve...
The probing security model is widely used to formally prove the security of masking schemes. Wheneve...
International audienceWe revisit the matrix model for non-interference (NI) probing security of mask...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Masking has been recognized as a sound and secure countermeasure for cryptographic implementations, ...
We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...