Towards Tight Random Probing Security

[1]  Yuval Ishai,et al.  Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.

[2]  Jean-Sébastien Coron,et al.  Higher-Order Side Channel Security and Mask Refreshing , 2013, FSE.

[3]  Antoine Joux,et al.  How to Securely Compute with Noisy Leakage in Quasilinear Complexity , 2018, IACR Cryptol. ePrint Arch..

[4]  Stefan Mangard,et al.  Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.

[5]  Alain Passelègue,et al.  Unifying Leakage Models on a Rényi Day , 2019, IACR Cryptol. ePrint Arch..

[6]  Stefan Dziembowski,et al.  Simple Refreshing in the Noisy Leakage Model , 2019, ASIACRYPT.

[7]  Pascal Sasdrich,et al.  SILVER - Statistical Independence and Leakage Verification , 2020, IACR Cryptol. ePrint Arch..

[8]  Stefan Mangard,et al.  Formal Verification of Masked Hardware Implementations in the Presence of Glitches , 2018, IACR Cryptol. ePrint Arch..

[9]  Marcin Andrychowicz,et al.  Circuit Compilers with O(1/\log (n)) Leakage Rate , 2016, EUROCRYPT.

[10]  François-Xavier Standaert,et al.  Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate: or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks , 2019 .

[11]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[12]  Amir Moradi,et al.  Leakage assessment methodology , 2016, Journal of Cryptographic Engineering.

[13]  Emmanuel Prouff,et al.  Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..

[14]  Benjamin Grégoire,et al.  maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults , 2019, ESORICS.

[15]  Pankaj Rohatgi,et al.  Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.

[16]  Emmanuel Prouff,et al.  Random Probing Security: Verification, Composition, Expansion and New Constructions , 2020, IACR Cryptol. ePrint Arch..

[17]  Jean-Sébastien Coron,et al.  Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme , 2016, CHES.

[18]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[19]  Benjamin Grégoire,et al.  Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification , 2021, IACR Cryptol. ePrint Arch..

[20]  Emmanuel Prouff,et al.  Masking against Side-Channel Attacks: A Formal Security Proof , 2013, EUROCRYPT.

[21]  Maciej Skorski,et al.  Noisy Leakage Revisited , 2015, EUROCRYPT.

[22]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[23]  Vincent Rijmen,et al.  Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches , 2011, Journal of Cryptology.

[24]  Yuval Ishai,et al.  Private Circuits: A Modular Approach , 2018, IACR Cryptol. ePrint Arch..

[25]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.