Measuring the information leakage is critical for evaluating the practical security of cryptographic devices against side-channel analysis. Information-theoretic measures can be used (along with Fano's inequality) to derive upper bounds on the success rate of any possible attack in terms of the number of side-channel measurements. Equivalently, this gives lower bounds on the number of queries for a given success probability of attack. In this paper, we consider cryptographic implementations protected by (first-order) masking schemes, and derive several information-theoretic bounds on the efficiency of any (second-order) attack. The obtained bounds are generic in that they do not depend on a specific attack but only on the leakage and maskin...
Abstract. In this paper, we consider a recently introduced framework that investigates physically ob...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
International audienceMutual information as an information-theoretic tool has been frequently used i...
International audienceMeasuring the information leakage is critical for evaluating the practical sec...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
In this paper, we consider a recently introduced framework that investigates physically observable i...
At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel attack targeting a...
Leakage certification aims at guaranteeing that the statistical models used in side-channel security...
Abstract. In this paper, we consider a recently introduced framework that investigates physically ob...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
International audienceMutual information as an information-theoretic tool has been frequently used i...
International audienceMeasuring the information leakage is critical for evaluating the practical sec...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
In this paper, we consider a recently introduced framework that investigates physically observable i...
At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel attack targeting a...
Leakage certification aims at guaranteeing that the statistical models used in side-channel security...
Abstract. In this paper, we consider a recently introduced framework that investigates physically ob...
Masking is a counter-measure that can be incorporated to software and hardware implementations of bl...
International audienceMutual information as an information-theoretic tool has been frequently used i...