Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

Masking kyber: First-and higher-order implementations

JW Bos, MO Gourjon, J Renes, T Schneider… - IACR Transactions on …, 2021 - tore.tuhh.de
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …

[PDF][PDF] Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SMD Pozo, C Paglialonga… - 2018 - repository.ubn.ru.nl
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Hardware private circuits: From trivial composition to full verification

G Cassiers, B Grégoire, I Levi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …

Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs

O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …

Making masking security proofs concrete: or how to evaluate the security of any leaking device

A Duc, S Faust, FX Standaert - … on the Theory and Applications of …, 2015 - Springer
We investigate the relationships between theoretical studies of leaking cryptographic
devices and concrete security evaluations with standard side-channel attacks. Our …

Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon

T Espitau, PA Fouque, F Gérard, M Rossi… - … Conference on the …, 2022 - Springer
This work describes the Mitaka signature scheme: a new hash-and-sign signature scheme
over NTRU lattices which can be seen as a variant of NIST finalist Falcon. It achieves …

Practical CCA2-secure and masked ring-LWE implementation

T Oder, T Schneider, T Pöppelmann… - Cryptology ePrint …, 2016 - eprint.iacr.org
During the last years public-key encryption schemes based on the hardness of ring-LWE
have gained significant popularity. For real-world security applications assuming strong …

Masking AES with shares in hardware

T De Cnudde, O Reparaz, B Bilgin, S Nikova… - … and Embedded Systems, 2016 - Springer
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security
against DPA attacks at order d. To this date, this minimal number has only been deployed in …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …