Skip to main content

and
Your search also matched 7 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Does Coupling Affect the Security of Masked Implementations?

Include preview-only content
  1. Chapter and Conference Paper

    Consolidating Masking Schemes

    In this paper we investigate relations between several masking schemes. We show that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. ...

    Oscar Reparaz, Begül Bilgin, Svetla Nikova in Advances in Cryptology -- CRYPTO 2015 (2015)

  2. Chapter and Conference Paper

    Selecting Time Samples for Multivariate DPA Attacks

    Masking on the algorithm level, i.e. concealing all sensitive intermediate values with random data, is a popular countermeasure against DPA attacks. A properly implemented masking scheme forces an attacker to ...

    Oscar Reparaz, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2012)

  3. Chapter and Conference Paper

    Theory and Practice of a Leakage Resilient Masking Scheme

    A recent trend in cryptography is to formally prove the leakage resilience of cryptographic implementations – that is, one formally shows that a scheme remains provably secure even in the presence of side channel...

    Josep Balasch, Sebastian Faust in Advances in Cryptology – ASIACRYPT 2012 (2012)

  4. Chapter and Conference Paper

    To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order

    We present a novel combined attack against ECC implementations that exploits specially crafted, but valid input points. The core idea is that after fault injection, these points turn into points of very low or...

    Junfeng Fan, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2011)

  5. Chapter and Conference Paper

    The World Is Not Enough: Another Look on Second-Order DPA

    In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysis and Gaussian templates are ess...

    François-Xavier Standaert in Advances in Cryptology - ASIACRYPT 2010 (2010)