Single-trace side-channel attacks are important attack vectors against the security of authenticated encryption schemes relying on an internal re-keying process, such as the NIST Lightweight Cryptography finalist ISAP. In a recent work of Kannwischer et al., it was suggested to mitigate such single-trace attacks with masking and shuffling. In this work, we first show that combining masking and re-keying is conceptually useless since this combination can always be attacked with a complexity that is just the sum of the complexities to attack a masked implementation (without re-keying) and a re-keyed implementation (without masking). We then show that combining shuffling and re-keying is theoretically founded but can be practically challenging...
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious thre...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One ...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
We revisit the popular adage that side-channel countermeasures must be combined to be efficient, and...
Modern cryptography relies on the Kerckhoff’s principle which states that everything about a crypto-...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
Cryptographic implementations are vulnerable to Side Channel Analysis (SCA), where an adversary expl...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious thre...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One ...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
We revisit the popular adage that side-channel countermeasures must be combined to be efficient, and...
Modern cryptography relies on the Kerckhoff’s principle which states that everything about a crypto-...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
Cryptographic implementations are vulnerable to Side Channel Analysis (SCA), where an adversary expl...
Modern cryptography has been widely deployed in the last decades, allowing any computing device to s...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious thre...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One ...