Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Gaëtan Cassiers"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Low-latency masked hardware implementations are known to be a difficult challenge. On the one hand, the propagation of glitches can falsify their independence assumption (that is required for security) and can only be stopped by registers. This impli
Externí odkaz:
https://doaj.org/article/2dfdd6f9e17943a3bce1200ee945a53b
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Masking is an effective countermeasure against side-channel attacks. It replaces every logic gate in a computation by a gadget that performs the operation over secret sharings of the circuit’s variables. When masking is implemented in hardware, car
Externí odkaz:
https://doaj.org/article/777d4499c6db4b22bb32a34fe534ff78
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
The masking countermeasure is very effective against side-channel attacks such as differential power analysis. However, the design of masked circuits is a challenging problem since one has to ensure security while minimizing performance overheads. Th
Externí odkaz:
https://doaj.org/article/8181fa2c1f5944a59aca3cee57359ff2
Autor:
Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Markus Schönauer, François-Xavier Standaert, Christine van Vredendaal
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
CRYSTALS-Dilithium has been selected by the NIST as the new standard for post-quantum digital signatures. In this work, we revisit the side-channel countermeasures of Dilithium in three directions. First, we improve its sensitivity analysis by classi
Externí odkaz:
https://doaj.org/article/732e91d24afb4af491279bbb2a064ec1
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
Current side-channel evaluation methodologies exhibit a gap between inefficient tools offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes case-specific) guarantees. Profiled attacks based on the empirical lea
Externí odkaz:
https://doaj.org/article/62cfd0533d7e4cf1b9f51ec69d8afa03
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security. This implies the need of sta
Externí odkaz:
https://doaj.org/article/18115505f5874b2fbb391a52559c519d
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking. Indeed, it is a common observation that the desired security amplification of Boolean mas
Externí odkaz:
https://doaj.org/article/17d05f47b708401c83be70aa2084f7b9
Autor:
Olivier Bronchain, Gaëtan Cassiers
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions between arithmetic and Boolean masking. While bitslicing has been shown to strongly speed
Externí odkaz:
https://doaj.org/article/97b4d0ce1a034f978bb962cb78d20e28
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in
Externí odkaz:
https://doaj.org/article/14dbd7b01ef442a194858e376f38386c
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 2 (2021)
There exists many masking schemes to protect implementations of cryptographic operations against side-channel attacks. It is common practice to analyze the security of these schemes in the probing model, or its variant which takes into account physic
Externí odkaz:
https://doaj.org/article/43b787b450a749e0b93787a021c70160