搜索结果: 1-8 共查到“密码学 masking schemes”相关记录8条 . 查询时间(0.09 秒)
At CRYPTO 2017, Belaïd et al. presented two new private multiplication algorithms over finite fields, to be used in secure masking schemes. To date, these algorithms have the lowest known complex...
Correction on “Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity”
masking scheme side-channel attacks probing model
2017/12/27
Provably secure masking schemes always require too many random generations, which significantly increases the implementation cost. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (...
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model
side-channel attacks masking probing security proofs physical defaults
2017/7/26
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable properties for secure implementations of masking schemes. While tools exist to guarantee them separatel...
Reducing the Number of Non-linear Multiplications in Masking Schemes
side-channel countermeasure masking probing security
2016/12/10
In recent years, methods to securely mask S-boxes against side-channel attacks by representing them as polynomials over finite binary fields have become quite efficient. A good cost model for this is ...
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
side-channel attacks masking formal methods
2016/12/9
In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue that (i) the...
Detecting flawed masking schemes with leakage detection tests
side-channel analysis DPA masking
2016/3/16
Masking is a popular countermeasure to thwart side-channel attacks on embedded systems. Many proposed masking schemes, even carrying ``security proofs'', are eventually broken because they are flawed ...
In this paper we investigate relations between several masking schemes. We show
that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold
Implementations and the Tric...
Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency
implementation / High-Order Masking High-Order Correlation Power Analysis (HO-CPA) High-Order CPA Immunity ($\mathsf{HCI}$) Mutual Information Metric (MIM)
2012/3/26
This article provides an in-depth study of high-order (HO) Boolean masking countermeasure against side-channel attacks. We introduce the notion of HO-CPA immunity as a metric to characterize a leakage...