Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must be combined to be efficient, and study its application to bitslice masking and shuffling. Our contributions are threefold. First, we improve this combination: by shuffling the shares of a masked implementation rather than its tuples, we can amplify the impact of the shuffling exponentially in the number of shares, while this impact was independent of the masking security order in previous works. Second, we evaluate the masking and shuffling combination's performance vs. security tradeoff under sufficient noise conditions: we show that the best approach is to mask first (i.e., fill the registers with as many shares as possible) and shuffle the...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Abstract—Side-channel attacks have been a real threat against many critical embedded systems that re...
Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must ...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Single-trace side-channel attacks are important attack vectors against the security of authenticated...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
Modern cryptography relies on the Kerckhoff’s principle which states that everything about a crypto-...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
© Springer International Publishing Switzerland 2015. Masking is one of the most popular countermeas...
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though mas...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Abstract—Side-channel attacks have been a real threat against many critical embedded systems that re...
Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must ...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Single-trace side-channel attacks are important attack vectors against the security of authenticated...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
Modern cryptography relies on the Kerckhoff’s principle which states that everything about a crypto-...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
© Springer International Publishing Switzerland 2015. Masking is one of the most popular countermeas...
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though mas...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Abstract—Side-channel attacks have been a real threat against many critical embedded systems that re...