At CRYPTO 2017, Belaïd et al. presented two new private multiplication algorithms over finite fields, to be used in secure masking schemes. To date, these algorithms have the lowest known complexity in terms of bilinear multiplication and random masks respectively, both being linear in the number of shares $d+1$. Yet, a practical drawback of both algorithms is that their safe instantiation relies on finding matrices satisfying certain conditions. In their work, Belaïd et al. only address these up to $d=2$ and 3 for the first and second algorithm respectively, limiting so far the practical usefulness of their constructions. In this paper, we use in turn an algebraic, heuristic, and experimental approach to find many more safe instances of Be...
At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel attack targeting a...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Higher-order masking countermeasures provide strong provable security against side-channel attacks a...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
peer reviewedMasking is an effective and widely-used countermeasure to thwart Differential Power Ana...
Masking is an effective and widely-used countermeasure to thwart Differential Power Analysis (DPA) a...
In this paper we investigate relations between several masking schemes. We show that the Ishai--Saha...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
Higher-order masking countermeasures provide strong provable security against side-channel attacks a...
At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel attack targeting a...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...
We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
Higher-order masking countermeasures provide strong provable security against side-channel attacks a...
We improve the state-of-the-art masking schemes in two important directions. First, we propose a new...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
We revisit the high-order masking schemes for private multiplication introduced by Belaïd et al. at ...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
peer reviewedMasking is an effective and widely-used countermeasure to thwart Differential Power Ana...
Masking is an effective and widely-used countermeasure to thwart Differential Power Analysis (DPA) a...
In this paper we investigate relations between several masking schemes. We show that the Ishai--Saha...
Application of masking, known as the most robust and reliable countermeasure to side-channel analysi...
Higher-order masking countermeasures provide strong provable security against side-channel attacks a...
At Eurocrypt 2015, Duc et al. conjectured that the success rate of a side-channel attack targeting a...
Evaluating the security level of a leaking implementation against side-channel attacks is a challeng...
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into sever...