SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Strong non-interference and type-directed higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - Proceedings of the …, 2016 - dl.acm.org
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …

Verified proofs of higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - … Conference on the …, 2015 - Springer
In this paper, we study the problem of automatically verifying higher-order masking
countermeasures. This problem is important in practice, since weaknesses have been …

On the cost of lazy engineering for masked software implementations

J Balasch, B Gierlichs, V Grosso, O Reparaz… - Smart Card Research …, 2015 - Springer
Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet,
its deployment in actual cryptographic devices is well known to be challenging, since …

SILVER–statistical independence and leakage verification

D Knichel, P Sasdrich, A Moradi - … on the Theory and Application of …, 2020 - Springer
Implementing cryptographic functions securely in the presence of physical adversaries is still
a challenge although a lion's share of research in the physical security domain has been put …

Formal verification of masked hardware implementations in the presence of glitches

R Bloem, H Groß, R Iusupov, B Könighofer… - Advances in Cryptology …, 2018 - Springer
Masking provides a high level of resistance against side-channel analysis. However, in
practice there are many possible pitfalls when masking schemes are applied, and …

Eliminating timing side-channel leaks using program repair

M Wu, S Guo, P Schaumont, C Wang - Proceedings of the 27th ACM …, 2018 - dl.acm.org
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …

maskverif: Automated verification of higher-order masking in presence of physical defaults

G Barthe, S Belaïd, G Cassiers, PA Fouque… - … –ESORICS 2019: 24th …, 2019 - Springer
Power and electromagnetic based side-channel attacks are serious threats against the
security of cryptographic embedded devices. In order to mitigate these attacks …

Exploration of power side-channel vulnerabilities in quantum computer controllers

C Xu, F Erata, J Szefer - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The rapidly growing interest in quantum computing also increases the importance of
securing these computers from various physical attacks. Constantly increasing qubit counts …