We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced by Belaïd et al. at CRYPTO 2017. This leads to two main results. 1) We generalise the theorems on which this model is based, so as to be able to apply them to masking schemes over any finite field --- in particular GF(2)--- and to be able to analyse the strong non-interference (SNI) security notion. We also follow Faust et al. (TCHES 2018) to additionally consider a robust probing model that takes hardware defects such as glitches into account. 2) We exploit this improved model to implement a very efficient verification algorithm that improves the performance of state-of-the-art software by three orders of magnitude. We show applications to ...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
International audienceThe design of glitch-resistant higher-order masking schemes is an important ch...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
International audienceWe revisit the matrix model for non-interference (NI) probing security of mask...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
Implementing the masking countermeasure in hardware is a delicate task. Various solutions have been ...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
At CRYPTO 2017, Belaïd et al. presented two new private multiplication algorithms over finite fields...
In this paper, we revisit the security conditions of masked hardware implementations. We describe a ...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
International audienceThe design of glitch-resistant higher-order masking schemes is an important ch...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...
International audienceWe revisit the matrix model for non-interference (NI) probing security of mask...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
Implementing the masking countermeasure in hardware is a delicate task. Various solutions have been ...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
At CRYPTO 2017, Belaïd et al. presented two new private multiplication algorithms over finite fields...
In this paper, we revisit the security conditions of masked hardware implementations. We describe a ...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable pro...
International audienceThe design of glitch-resistant higher-order masking schemes is an important ch...
We revisit the analysis and design of masked cryptographic implementations to prevent side-channel a...