International audienceMeasuring the information leakage is critical for evaluating the practical security of cryptographic devices against side-channel analysis. Information-theoretic measures can be used (along with Fano’s inequality) to derive upper bounds on the success rate of any possible attack in terms of the number of side-channel measurements. Equivalently, this gives lower bounds on the number of queries for a given success probability of attack. In this paper, we consider cryptographic implementations protected by (first-order) masking schemes, and derive several information-theoretic bounds on the efficiency of any (second- order) attack. The obtained bounds are generic in that they do not depend on a specific attack but only on...
International audienceMutual information as an information-theoretic tool has been frequently used i...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Current side-channel evaluation methodologies exhibit a gap betweeninefficient tools offering strong...
Measuring the information leakage is critical for evaluating the practical security of cryptographic...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
In this paper, we consider a recently introduced framework that investigates physically observable i...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Abstract. In this paper, we consider a recently introduced framework that investigates physically ob...
International audienceBlock ciphers are protected against side-channel attacks by masking. On one ha...
International audienceMutual information as an information-theoretic tool has been frequently used i...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Current side-channel evaluation methodologies exhibit a gap betweeninefficient tools offering strong...
Measuring the information leakage is critical for evaluating the practical security of cryptographic...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
We investigate the relationship between theoretical studies of leaking cryptographic devices and con...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
We investigate the relationships between theoretical studies of leaking cryptographic devices and co...
In this paper, we consider a recently introduced framework that investigates physically observable i...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
Abstract. In this paper, we consider a recently introduced framework that investigates physically ob...
International audienceBlock ciphers are protected against side-channel attacks by masking. On one ha...
International audienceMutual information as an information-theoretic tool has been frequently used i...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Current side-channel evaluation methodologies exhibit a gap betweeninefficient tools offering strong...