Sciweavers

11 search results - page 1 / 3
» Side Channel Cryptanalysis of a Higher Order Masking Scheme
Sort
View
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
14 years 5 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 12 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 11 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
BIRTHDAY
2012
Springer
12 years 6 months ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...