maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
暂无分享,去创建一个
Benjamin Grégoire | François-Xavier Standaert | Pierre-Alain Fouque | Sonia Belaïd | Gaëtan Cassiers | Gilles Barthe | G. Barthe | François-Xavier Standaert | Sonia Belaïd | Pierre-Alain Fouque | B. Grégoire | Gaëtan Cassiers
[1] Benjamin Grégoire,et al. Verified Proofs of Higher-Order Masking , 2015, EUROCRYPT.
[2] Stefan Mangard,et al. An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order , 2017, CT-RSA.
[3] François-Xavier Standaert,et al. Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model , 2018, IACR Cryptol. ePrint Arch..
[4] Matthew J. B. Robshaw,et al. The Block Cipher Companion , 2011, Information Security and Cryptography.
[5] Josep Balasch,et al. On the Cost of Lazy Engineering for Masked Software Implementations , 2014, CARDIS.
[6] Jean-Sébastien Coron,et al. Conversion of Security Proofs from One Leakage Model to Another: A New Issue , 2012, COSADE.
[7] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] Bruce M. Kapron,et al. On the Equality of Probabilistic Terms , 2010, LPAR.
[10] Benjamin Grégoire,et al. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model , 2017, EUROCRYPT.
[11] Patrick Schaumont,et al. Formal Verification of Software Countermeasures against Side-Channel Attacks , 2014, ACM Trans. Softw. Eng. Methodol..
[12] Sonia Belaïd,et al. Tight Private Circuits: Achieving Probing Security with the Least Refreshing , 2018, IACR Cryptol. ePrint Arch..
[13] Yuval Ishai,et al. Private Circuits II: Keeping Secrets in Tamperable Circuits , 2006, EUROCRYPT.
[14] Vincent Rijmen,et al. Threshold Implementations Against Side-Channel Attacks and Glitches , 2006, ICICS.
[15] Stefan Mangard,et al. Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking , 2018, IACR Cryptol. ePrint Arch..
[16] François-Xavier Standaert,et al. Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device , 2015, EUROCRYPT.
[17] Chao Wang,et al. SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks , 2018, CAV.
[18] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[19] Stefan Mangard,et al. Higher-Order Side-Channel Protected Implementations of KECCAK , 2017, 2017 Euromicro Conference on Digital System Design (DSD).
[20] Patrick Schaumont,et al. Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[21] Jean-Sébastien Coron,et al. Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations , 2018, IACR Cryptol. ePrint Arch..
[22] Stefan Mangard,et al. Formal Verification of Masked Hardware Implementations in the Presence of Glitches , 2018, IACR Cryptol. ePrint Arch..
[23] Michael Tunstall,et al. Compiler Assisted Masking , 2012, CHES.
[24] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[25] Andrey Bogdanov,et al. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware , 2013, CHES.
[26] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[27] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[28] Elena Trichina,et al. Combinational Logic Design for AES SubByte Transformation on Masked Data , 2003, IACR Cryptol. ePrint Arch..
[29] David Novo,et al. Sleuth: Automated Verification of Software Power Analysis Countermeasures , 2013, CHES.
[30] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[31] Benjamin Grégoire,et al. Strong Non-Interference and Type-Directed Higher-Order Masking , 2016, CCS.