The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

C Beierle, J Jean, S Kölbl, G Leander, A Moradi… - Advances in Cryptology …, 2016 - Springer
We present a new tweakable block cipher family SKINNY, whose goal is to compete with
NSA recent design SIMON in terms of hardware/software performances, while proving in …

Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Passive physical attacks, like power analysis, pose a serious threat to the security of
embedded systems and corresponding countermeasures need to be implemented. In this …

A comprehensive survey on the non-invasive passive side-channel analysis

P Socha, V Miškovský, M Novotný - Sensors, 2022 - mdpi.com
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …

Masking AES with shares in hardware

T De Cnudde, O Reparaz, B Bilgin, S Nikova… - … and Embedded Systems, 2016 - Springer
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …

An efficient side-channel protected AES implementation with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptographers' Track at the RSA …, 2017 - Springer
Passive physical attacks, like power analysis, pose a serious threat to the security of digital
circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption …

Leakage detection with the x2-test

A Moradi, B Richter, T Schneider… - IACR Transactions on …, 2018 - tches.iacr.org
We describe how Pearson's χ 2-test can be used as a natural complement to Welch's t-test
for black box leakage detection. In particular, we show that by using these two tests in …

Re-consolidating first-order masking schemes: Nullifying fresh randomness

AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …

Real-world snapshots vs. theory: Questioning the t-probing security model

T Krachenfels, F Ganji, A Moradi… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …

Automated generation of masked hardware

D Knichel, A Moradi, N Müller, P Sasdrich - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Masking has been recognized as a sound and secure countermeasure for cryptographic
implementations, protecting against physical side-channel attacks. Even though many …

Hardware masking, revisited

T De Cnudde, M Ender, A Moradi - IACR Transactions on …, 2018 - tches.iacr.org
MaskingHardware masking schemes have shown many advances in the past few years.
Through a series of publications their implementation cost has dropped significantly and …