[PDF][PDF] Complementary dual codes for counter-measures to side-channel attacks.

C Carlet, S Guilley - Adv. Math. Commun., 2016 - researchgate.net
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …

Complementary Dual Codes for Counter-Measures to Side-Channel Attacks.

C Carlet, S Guilley - ICMCTA, 2014 - Springer
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …

Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks

J Bringer, C Carlet, H Chabanne, S Guilley… - … on Information Security …, 2014 - Springer
Secure elements, such as smartcards or trusted platform modules (TPMs), must be protected
against implementation-level attacks. Those include side-channel and fault injection attacks …

Profiling power analysis attack based on MLP in DPA contest V4. 2

Z Martinasek, P Dzurenda… - 2016 39th International …, 2016 - ieeexplore.ieee.org
DPA (Differential Power Analysis) Contest is well-known international framework that allows
researchers to compare their power analysis attacks under the same conditions. The latest …

Analysis and improvements of the DPA contest v4 implementation

S Bhasin, N Bruneau, JL Danger, S Guilley… - Security, Privacy, and …, 2014 - Springer
DPA Contest is an international framework which allows researchers to compare their
attacks under a common setting. The latest version of DPA Contest proposes a software …

Statistical properties of side-channel and fault injection attacks using coding theory

C Carlet, S Guilley - Cryptography and Communications, 2018 - Springer
Naïve implementation of block ciphers are subject to side-channel and fault injection attacks.
To deceive side-channel attacks and to detect fault injection attacks, the designer inserts …

Threshold Implementation in Software: Case Study of PRESENT

P Sasdrich, R Bock, A Moradi - … Side-Channel Analysis and Secure Design …, 2018 - Springer
Masking is one of the predominantly deployed countermeasures in order to prevent side-
channel analysis (SCA) attacks. Over the years, various masking schemes have been …

Leakage squeezing: Optimal implementation and security evaluation

C Carlet, JL Danger, S Guilley… - Journal of Mathematical …, 2014 - degruyter.com
Hardware devices can be protected against side-channel attacks by introducing one random
mask per sensitive variable. The computation throughout is unaltered if the shares (masked …

Robust profiled attacks: should the adversary trust the dataset?

L Lerman, Z Martinasek… - IET Information Security, 2017 - Wiley Online Library
Side‐channel attacks provide tools to analyse the degree of resilience of a cryptographic
device against adversaries measuring leakages (eg power traces) on the target device …

Crucial pitfall of DPA Contest V4. 2 implementation

Z Martinasek, F Iglesias, L Malina… - Security and …, 2016 - Wiley Online Library
Differential power analysis (DPA) is a powerful side‐channel key recovery attack that
efficiently breaks cryptographic algorithm implementations. In order to prevent these types of …