[PDF][PDF] Scalib: a side-channel analysis library

G Cassiers, O Bronchain - Journal of Open Source Software, 2023 - joss.theoj.org
Side-channel attacks exploit unintended leakage from an electronic device in order to
retrieve secret data. In particular, attacks exploiting physical side-channels such as power …

Glitch-Stopping Circuits: Hardware Secure Masking without Registers

Z Zhang, S Petkova-Nikova, V Nikov - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Masking is one of the most popular countermeasures to protect implementations against
power and electromagnetic side-channel attacks because it offers provable security …

A memory hierarchy protected against side-channel attacks

EB Talaki, O Savry, M Bouvier Des Noes, D Hely - Cryptography, 2022 - mdpi.com
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the
most valuable element to protect against information theft. Many first-order side-channel …

Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency

B Gigerl, F Klug, S Mangard, F Mendel… - IACR Transactions on …, 2024 - icscm.ub.rub.de
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as
power analysis. Masking is a popular countermeasure against such attacks, which works by …

Generalized feistel ciphers for efficient prime field masking-full version

L Grassi, L Masure, P Méaux, T Moos… - Cryptology ePrint …, 2024 - eprint.iacr.org
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon

G Cassiers, FX Standaert… - IACR Transactions on …, 2024 - ojs.ub.ruhr-uni-bochum.de
Low-latency masked hardware implementations are known to be a difficult challenge. On the
one hand, the propagation of glitches can falsify their independence assumption (that is …

Generalized Feistel Ciphers for Efficient Prime Field Masking

L Grassi, L Masure, P Méaux, T Moos… - … Conference on the …, 2024 - Springer
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …

Robust but Relaxed Probing Model

N Müller, A Moradi - IACR Transactions on Cryptographic Hardware …, 2024 - tosc.iacr.org
Masking has become a widely applied and heavily researched method to protect
cryptographic implementations against Side-Channel Analysis (SCA) attacks. The success …

A New Fast and Side-Channel Resistant AES Hardware Architecture

M Macchetti, H Pelletier, C Groux - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In this paper we present a novel architecture for a high-speed AES crypto core which is
resistant against first-order side channel attacks; our design combines Boolean masking …

Low-latency masking with arbitrary protection order based on click elements

M Simões, L Bossuet, N Bruneau… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Masking is the main countermeasure against side-channel attacks due to its sound formal
proof of security and the scalability of its protection parameters. However, effective masking …