Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
暂无分享,去创建一个
Benjamin Grégoire | Gilles Barthe | Pierre-Yves Strub | François Dupressoir | François-Xavier Standaert | Pierre-Alain Fouque | Sonia Belaïd | G. Barthe | Pierre-Yves Strub | François-Xavier Standaert | Sonia Belaïd | Pierre-Alain Fouque | B. Grégoire | François Dupressoir
[1] François-Xavier Standaert,et al. Improved Bitslice Masking: from Optimized Non-Interference to Probe Isolation , 2018, IACR Cryptol. ePrint Arch..
[2] Kenneth G. Paterson,et al. Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS , 2016, EUROCRYPT.
[3] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[4] Jean-Sébastien Coron,et al. Side Channel Cryptanalysis of a Higher Order Masking Scheme , 2007, CHES.
[5] Emmanuel Prouff,et al. Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.
[6] Jean-Sébastien Coron,et al. Higher-Order Side Channel Security and Mask Refreshing , 2013, FSE.
[7] Yuval Yarom,et al. ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels , 2016, IACR Cryptol. ePrint Arch..
[8] Claude Carlet,et al. Algebraic Decomposition for Probing Security , 2015, CRYPTO.
[9] Vinod Vaikuntanathan,et al. Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases , 2010, EUROCRYPT.
[10] Matthieu Rivain,et al. How Fast Can Higher-Order Masking Be in Software? , 2017, EUROCRYPT.
[11] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[12] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[13] Benjamin Grégoire,et al. Verified Proofs of Higher-Order Masking , 2015, EUROCRYPT.
[14] Adrian Thillard,et al. Randomness Complexity of Private Circuits for Multiplication , 2016, EUROCRYPT.
[15] Naofumi Homma,et al. Cryptographic Hardware and Embedded Systems – CHES 2017 , 2017, Lecture Notes in Computer Science.
[16] Adi Shamir,et al. Efficient Cache Attacks on AES, and Countermeasures , 2010, Journal of Cryptology.
[17] François-Xavier Standaert,et al. Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device , 2015, EUROCRYPT.
[18] Benjamin Grégoire,et al. Strong Non-Interference and Type-Directed Higher-Order Masking , 2016, CCS.
[19] Jean-Sébastien Coron,et al. Higher Order Masking of Look-up Tables , 2014, IACR Cryptol. ePrint Arch..
[20] Stefan Mangard,et al. Reconciling d+1 Masking in Hardware and Software , 2017, CHES.
[21] Stefan Mangard,et al. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches , 2015, USENIX Security Symposium.
[22] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[23] Christof Paar,et al. Higher Order Masking of the AES , 2006, CT-RSA.
[24] Jean-Sébastien Coron,et al. Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme , 2016, CHES.
[25] Benjamin Grégoire,et al. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model , 2017, EUROCRYPT.
[26] François-Xavier Standaert,et al. Very High Order Masking: Efficient Implementation and Security Evaluation , 2017, IACR Cryptol. ePrint Arch..
[27] Benjamin Grégoire,et al. Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler , 2015, IACR Cryptol. ePrint Arch..