The modular addition is used as a non-linear operation in ARX ciphers because it achieves the requirement of introducing non-linearity in a cryptographic primitive while only taking one clock cycle to execute on most modern archi- tectures. This makes ARX ciphers especially fast in software implementations, but comes at the cost of making it harder to protect against side-channel information leakages using Boolean masking: the best known 2-shares masked adder for ARM Thumb micro-controllers takes 83 instructions to add two 32-bit numbers together. Our approach is to operate in bitsliced mode, performing 32 additions in parallel on a 32-bit microcontroller. We show that, even after taking into account the cost of bitslicing befor...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...
The modular addition is used as a non-linear operation in ARX ciphers because it achieves the requi...
The current state of the art of Boolean masking for the modular addition operation in software has a...
Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems agains...
In this paper, we optimize the performances and compare several recent masking schemes in bitslice o...
International audienceThe cost of higher-order masking as a countermeasure against side-channel atta...
peer reviewedBoolean masking is an effective side-channel countermeasure that consists in splitting ...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Embedded devices used in security applications are natural targets for physical attacks. Thus, enhan...
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation, exclusiv...
In this paper, we study the performances and security of recent masking algorithms specialized to pa...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...
The modular addition is used as a non-linear operation in ARX ciphers because it achieves the requi...
The current state of the art of Boolean masking for the modular addition operation in software has a...
Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems agains...
In this paper, we optimize the performances and compare several recent masking schemes in bitslice o...
International audienceThe cost of higher-order masking as a countermeasure against side-channel atta...
peer reviewedBoolean masking is an effective side-channel countermeasure that consists in splitting ...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Embedded devices used in security applications are natural targets for physical attacks. Thus, enhan...
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation, exclusiv...
In this paper, we study the performances and security of recent masking algorithms specialized to pa...
Abstract. We propose a new countermeasure to protect block ciphers implemented in leaking devices, a...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the inte...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...