搜索结果: 1-15 共查到“密码学 higher-order”相关记录51条 . 查询时间(0.171 秒)
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
fault attacks masking persistent
font style='font-size:12px;'>
2019/1/9
Persistent fault analysis (PFA) was proposed at CHES 2018 as a novel fault analysis technique. It was shown to completely defeat standard redundancy based countermeasure against fault analysis. In thi...
Higher-Order DCA against Standard Side-Channel Countermeasures
White-box DCA Higher-order DCA
font style='font-size:12px;'>
2018/11/13
At CHES 2016, Bos et al.et al. introduced differential computational analysisdifferential computational analysis (DCA) as an attack on white-box software implementations of block ciphers. This attack ...
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
font style='font-size:12px;'>
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
various contexts implementation constraints
font style='font-size:12px;'>
2018/4/4
In this paper, we optimize the performances and compare several recent masking schemes in bitslice on 32-bit arm devices, with a focus on multiplication. Our main conclusion is that efficiency (or ran...
Vectorizing Higher-Order Masking
Higher-order masking side-channel analysis AES
font style='font-size:12px;'>
2018/3/6
The cost of higher-order masking as a countermeasure against side-channel attacks is often considered too high for practical scenarios, as protected implementations become very slow. At Eurocrypt 2017...
Higher Order Side-Channel Attacks Resilient S-boxes
S-box construction Genetic algorithms Higher-order side-channel analysis
font style='font-size:12px;'>
2018/1/12
Masking and hiding schemes represent a well-researched and successful option to follow when considering side-channel countermeasures. Still, such measures increase the implementation cost in term of p...
Correction on “Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity”
masking scheme side-channel attacks probing model
font style='font-size:12px;'>
2017/12/27
Provably secure masking schemes always require too many random generations, which significantly increases the implementation cost. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (...
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
Kernel Discriminant Analysis Higher-order Side Channel Analysis Side Channel Distinguisher
font style='font-size:12px;'>
2017/11/1
Distinguishers play an important role in Side Channel Analysis (SCA), where real world leakage information is compared against hypothetical predictions in order to guess at the underlying secret key. ...
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'
higher-order masking probing security
font style='font-size:12px;'>
2017/11/1
Zhang, Qiu and Zhou propose two optimised masked algorithms for computing functions of the form x↦x⋅ℓ(x)x↦x⋅ℓ(x) for any linear function ℓℓ. They claim ...
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Higher-Order Alphabet PUFs Error-Correcting Codes
font style='font-size:12px;'>
2017/9/25
Device-specific physical characteristics provide the foundation for PUFs, a hardware primitive for secure storage of cryptographic keys. So far, they have been implemented by either directly evaluatin...
CryptHOL: Game-based Proofs in Higher-order Logic
Provable Security Game-based Proofs Theorem Proving
font style='font-size:12px;'>
2017/8/8
Game-based proofs are a well-established paradigm for structuring security arguments and simplifying their understanding. We present a novel framework, CryptHOL, for rigorous game-based proofs that is...
Higher-Order Side-Channel Protected Implementations of Keccak
Keccak SHA-3 masking
font style='font-size:12px;'>
2017/5/11
The efficient protection of security critical devices against side-channel analysis attacks is a fundamental need in the age of Internet of Things and ubiquitous computing. In this work, we introduce ...
On the Easiness of Turning Higher-Order Leakages into First-Order
side-channel analysis masking higher-order
font style='font-size:12px;'>
2017/3/31
Applying random and uniform masks to the processed intermediate values of cryptographic algorithms is arguably the most common countermeasure to thwart side-channel analysis attacks. So-called masking...
From Higher-Order Differentials to Polytopic Cryptanalysis
crytpanalysis block ciphers higher-order
font style='font-size:12px;'>
2017/3/27
Polytopic cryptanalysis was introduced at EUROCRYPT 2016 as a cryptanalytic technique for low-data-complexity attacks on block ciphers. In this paper, we give an account of how the technique was devel...
Constant-Time Higher-Order Boolean-to-Arithmetic Masking
Side-channel analysis higher-order DPA mask switching
font style='font-size:12px;'>
2016/12/7
Converting a Boolean mask to an arithmetic mask, and vice
versa, is often required in implementing side-channel resistant instances
of cryptographic algorithms that mix Boolean and arithmetic operat...