搜索结果: 1-15 共查到“Masking”相关记录123条 . 查询时间(0.109 秒)
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
font style='font-size:12px;'>
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
font style='font-size:12px;'>
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Masking Post-quantum Cryptography
font style='font-size:12px;'>
2019/8/8
With the rising popularity of lattice-based cryptography, the Learning with Errors (LWE) problem has emerged as a fundamental core of numerous encryption and key exchange schemes. Many LWE-based schem...
Masking Fuzzy-Searchable Public Databases
keyless searchable encryption LSH image search
font style='font-size:12px;'>
2019/4/29
We introduce and study the notion of keyless fuzzy search (KlFS) which allows to mask a publicly available database in such a way that any third party can retrieve content if and only if it possesses ...
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Efficient Implementation Side-Channel Evaluation
font style='font-size:12px;'>
2019/4/22
Although security against side-channel attacks is not an explicit design criterion of the NIST post-quantum standardization effort, it is certainly a major concern for schemes that are meant for real-...
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
fault attacks masking persistent
font style='font-size:12px;'>
2019/1/9
Persistent fault analysis (PFA) was proposed at CHES 2018 as a novel fault analysis technique. It was shown to completely defeat standard redundancy based countermeasure against fault analysis. In thi...
A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
side-channel probing model transitional leakage
font style='font-size:12px;'>
2018/11/21
Recently, Gross et al. demonstrated a first-order probing-secure implementation of AES using only two bits of randomness for both the initial sharing and the entire computation of AES. In this note, w...
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
masking shuffling RNG
font style='font-size:12px;'>
2018/11/19
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large am...
Multiplicative Masking for AES in Hardware
DPA Masking Glitches Sharing
font style='font-size:12px;'>
2018/11/13
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box using the tower-field decomposition. On the other hand, splitting sensitive variables in a multipli...
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
side-channel attack mask conversion IoT
font style='font-size:12px;'>
2018/11/7
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field. For these devices, the authentic functionality is important so that the IoT sys...
Masking the AES with Only Two Random Bits
masking AES first-order masking
font style='font-size:12px;'>
2018/11/5
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though masking was invented almost 20 years ago, research on the efficient implementation of masking continues...
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
masking formal verification domain-oriented masking
font style='font-size:12px;'>
2018/11/2
The efficient verification of the security of masked hardware implementations is an important issue that hinders the development and deployment of randomness-efficient masking techniques. At EUROCRYPT...
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Side Channel Analysis Masking Countermeasures DPA Contest
font style='font-size:12px;'>
2018/8/20
Low Entropy Masking Scheme (LEMS) has attracted wide attention for its low-cost feature of small fixed mask sets in Side-Channel-Analysis (SCA). To achieve the expected side channel security, it is ne...
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software
ACORN Ascon DPA
font style='font-size:12px;'>
2018/8/2
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM for several use-cases, including lightweight applications. ACORN and Ascon are the tw...
Secure Oblivious Transfer from Semi-Commutative Masking
oblivious transfer UC security group action
font style='font-size:12px;'>
2018/7/9
In this work we first define semi-commutative (invertible) masking structures which present a simple abstraction to capture the various examples of protocol design that are based on exponentiation-onl...