Ironmask: Versatile verification of masking security

S Belaïd, D Mercadier, M Rivain… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
This paper introduces lronMask, a new versatile verification tool for masking security.
lronMask is the first to offer the verification of standard simulation-based security notions in …

Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks

P Gao, Y Zhang, F Song, T Chen… - Proceedings of the ACM …, 2023 - dl.acm.org
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …

Efficient private circuits with precomputation

W Wang, F Ji, J Zhang, Y Yu - IACR Transactions on Cryptographic …, 2023 - tches.iacr.org
At CHES 2022, Wang et al. described a new paradigm for masked implementations using
private circuits, where most intermediates can be precomputed before the input shares are …

Unifying freedom and separation for tight probing-secure composition

S Belaïd, G Cassiers, M Rivain, AR Taleb - Annual International …, 2023 - Springer
The masking countermeasure is often analyzed in the probing model. Proving the probing
security of large circuits at high masking orders is achieved by composing gadgets that …

Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks

P Gao, F Song, T Chen - ACM Transactions on Software Engineering …, 2024 - dl.acm.org
Power side-channel attacks allow an adversary to efficiently and effectively steal secret
information (eg, keys) by exploiting the correlation between secret data and runtime power …

[图书][B] Advances in Cryptology–CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023 …

H Handschuh, A Lysyanskaya - 2023 - books.google.com
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the
refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO …

VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations

Q Meunier, A Taleb - 20th International Conference on Security and …, 2023 - hal.science
Side-Channel Attacks are powerful attacks which can recover secret information in a
cryptographic device by analysing physical quantities such as power consumption. Masking …

Electromagnetic Leakage Assessment of a Proven Higher-Order Masking of AES S-Box

N Bordes, P Maistri - 2022 25th Euromicro Conference on …, 2022 - ieeexplore.ieee.org
Many digital systems need to provide cryptographic capabilities. A large part of these
devices is easily accessible by the malicious user, and may be vulnerable to side channel …

Masking Verification

AR TALEB - Embedded Cryptography 2, 2025 - books.google.com
Chapter 4 formally discussed proving the security of masked implementations in different
leakage models. The main leakage models introduced are the noisy leakage model, the …

Secure and Verified Cryptographic Implementations in the Random Probing Model

AR Taleb - 2023 - theses.hal.science
The masking countermeasure is among the most potent countermeasures to counteract side-
channel attacks. Leakage models have been exhibited to theoretically reason on the …