Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs

O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …

Sok: Design tools for side-channel-aware implementations

I Buhan, L Batina, Y Yarom, P Schaumont - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …

Rosita: Towards automatic elimination of power-analysis leakage in ciphers

MA Shelton, N Samwel, L Batina, F Regazzoni… - arXiv preprint arXiv …, 2019 - arxiv.org
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …

Miracle: Micro-architectural leakage evaluation

B Marshall, D Page, J Webb - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …

Ironmask: Versatile verification of masking security

S Belaïd, D Mercadier, M Rivain… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
This paper introduces lronMask, a new versatile verification tool for masking security.
lronMask is the first to offer the verification of standard simulation-based security notions in …

PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software

J Zeitschner, A Moradi - IACR Transactions on Cryptographic …, 2024 - tches.iacr.org
Software solutions to address computational challenges are ubiquitous in our daily lives.
One specific application area where software is often used is in embedded systems, which …

VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering

J Richter-Brockmann, J Feldtkeller, P Sasdrich… - Cryptology ePrint …, 2022 - eprint.iacr.org
Physical attacks, including passive Side-Channel Analysis and active Fault Injection
Analysis, are considered among the most powerful threats against physical cryptographic …

Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks

P Gao, Y Zhang, F Song, T Chen… - Proceedings of the ACM …, 2023 - dl.acm.org
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …

A survey of recent developments in testability, safety and security of risc-v processors

J Anders, P Andreu, B Becker, S Becker… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
With the continued success of the open RISC-V architecture, practical deployment of RISC-V
processors necessitates an in-depth consideration of their testability, safety and security …

Deep learning gradient visualization-based pre-silicon side-channel leakage location

Y Li, J Zhu, Z Liu, M Tang, S Ren - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While side-channel attacks (SCAs) have become a significant threat to cryptographic
algorithms, masking is considered as an effective countermeasure against SCAs. On the …