Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

[PDF][PDF] Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SMD Pozo, C Paglialonga… - 2018 - repository.ubn.ru.nl
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Making masking security proofs concrete: or how to evaluate the security of any leaking device

A Duc, S Faust, FX Standaert - … on the Theory and Applications of …, 2015 - Springer
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …

How (not) to use welch's t-test in side-channel security evaluations

FX Standaert - Smart Card Research and Advanced Applications: 17th …, 2019 - Springer
Abstract The Test Vector Leakage Assessment (TVLA) methodology is a qualitative tool
relying on Welch's T-test to assess the security of cryptographic implementations against …

SILVER–statistical independence and leakage verification

D Knichel, P Sasdrich, A Moradi - … on the Theory and Application of …, 2020 - Springer
Implementing cryptographic functions securely in the presence of physical adversaries is still
a challenge although a lion's share of research in the physical security domain has been put …

Remove some noise: On pre-processing of side-channel measurements with autoencoders

L Wu, S Picek - IACR Transactions on Cryptographic Hardware and …, 2020 - tches.iacr.org
In the profiled side-channel analysis, deep learning-based techniques proved to be very
successful even when attacking targets protected with countermeasures. Still, there is no …

Formal verification of masked hardware implementations in the presence of glitches

R Bloem, H Groß, R Iusupov, B Könighofer… - Advances in Cryptology …, 2018 - Springer
Masking provides a high level of resistance against side-channel analysis. However, in
practice there are many possible pitfalls when masking schemes are applied, and …

Trivially and efficiently composing masked gadgets with probe isolating non-interference

G Cassiers, FX Standaert - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We revisit the analysis and design of masked cryptographic implementations to prevent side-
channel attacks. Our starting point is the (known) observation that proving the security of a …

How fast can higher-order masking be in software?

D Goudarzi, M Rivain - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
Higher-order masking is widely accepted as a sound countermeasure to protect
implementations of blockciphers against side-channel attacks. The main issue while …

PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations

H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han… - Information Security and …, 2021 - Springer
In this paper, we introduce a new lightweight 64-bit block cipher PIPO (PIPO stands for “Plug-
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …