Sciweavers

11 search results - page 1 / 3
» Side Channel Cryptanalysis of a Higher Order Masking Scheme
Sort
View
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
13 years 11 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 6 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 5 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
SERSCISA
2009
Springer
13 years 11 months ago
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects
Zhimin Chen, Syed Haider, Patrick Schaumont
BIRTHDAY
2012
Springer
12 years 18 days ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...