Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Passive physical attacks, like power analysis, pose a serious threat to the security of
embedded systems and corresponding countermeasures need to be implemented. In this …

Masked accelerators and instruction set extensions for post-quantum cryptography

T Fritzmann, M Van Beirendonck… - IACR Transactions …, 2021 - lirias.kuleuven.be
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …

Consolidating masking schemes

O Reparaz, B Bilgin, S Nikova, B Gierlichs… - Advances in Cryptology …, 2015 - Springer
In this paper we investigate relations between several masking schemes. We show that the
Ishai–Sahai–Wagner private circuits construction is closely related to Threshold …

[PDF][PDF] Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SMD Pozo, C Paglialonga… - 2018 - repository.ubn.ru.nl
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Higher-order threshold implementations

B Bilgin, B Gierlichs, S Nikova, V Nikov… - Advances in Cryptology …, 2014 - Springer
Higher-order differential power analysis attacks are a serious threat for cryptographic
hardware implementations. In particular, glitches in the circuit make it hard to protect the …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …

An efficient side-channel protected AES implementation with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptographers' Track at the RSA …, 2017 - Springer
Passive physical attacks, like power analysis, pose a serious threat to the security of digital
circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption …

ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks

T Schneider, A Moradi, T Güneysu - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
Side-channel analysis and fault-injection attacks are known as major threats to any
cryptographic implementation. Hardening cryptographic implementations with appropriate …

How fast can higher-order masking be in software?

D Goudarzi, M Rivain - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
Higher-order masking is widely accepted as a sound countermeasure to protect
implementations of blockciphers against side-channel attacks. The main issue while …