Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Siemen Dhooghe"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
We present a novel approach to small area and low-latency first-order masking in hardware. The core idea is to separate the processing of shares in time in order to achieve non-completeness. Resulting circuits are proven first-order glitchextended PI
Externí odkaz:
https://doaj.org/article/dcbe847270be4be9beb91c7d85637d77
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the kn
Externí odkaz:
https://doaj.org/article/29320cb6b27644ab91485c38cd116930
Autor:
John Gaspoz, Siemen Dhooghe
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the liter
Externí odkaz:
https://doaj.org/article/0238f4025d7f4098a6e0666231c94e77
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 1 (2022)
Masking schemes are the most popular countermeasure to mitigate Side-Channel Analysis (SCA) attacks. Compared to software, their hardware implementations require certain considerations with respect to physical defaults, such as glitches. To counter t
Externí odkaz:
https://doaj.org/article/8020292eb06c44ada56d387922fc7cd2
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. The main idea lies on a combination of the constructions given by Shahmirzadi and
Externí odkaz:
https://doaj.org/article/3bb2fde083c94208b0257cc864809569
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Svetla Nikova, Siemen Dhooghe
Publikováno v:
Cryptography and Communications. 14:41-58
Threshold Implementations are known countermeasures defending against side-channel attacks via the use of masking techniques. While sufficient properties are known to defend against first-order side-channel attacks, it is not known how to achieve hig
Publikováno v:
Selected Areas in Cryptography ISBN: 9783030992767
ispartof: pages:87-110 ispartof: SELECTED AREAS IN CRYPTOGRAPHY vol:13203 pages:87-110 ispartof: 28th International Conference on Selected Areas in Cryptography (SAC) location:ELECTR NETWORK, Univ Victoria date:29 Sep - 1 Oct 2021 status: published
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::117d3af0801e10d8318c8430c8adaf96
https://lirias.kuleuven.be/handle/20.500.12942/695661
https://lirias.kuleuven.be/handle/20.500.12942/695661
Autor:
Svetla Nikova, Siemen Dhooghe
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030684860
CARDIS
CARDIS
The wire probe-and-fault models are currently the most used models to provide arguments for side-channel and fault security. However, several practical attacks are not yet covered by these models. This work extends the wire fault model to include mor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f29d44fb4a5490017ec0159f35ca008d
https://doi.org/10.1007/978-3-030-68487-7_12
https://doi.org/10.1007/978-3-030-68487-7_12
Autor:
Siemen Dhooghe
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030925178
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::00400d482d5f3b5088eaad5534cc34bc
https://doi.org/10.1007/978-3-030-92518-5_10
https://doi.org/10.1007/978-3-030-92518-5_10