搜索结果: 46-60 共查到“军事学 Masking”相关记录77条 . 查询时间(0.117 秒)
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
masking domain-oriented masking threshold implementations
2016/5/24
Passive physical attacks, like power analysis, pose a serious threat to the security of embedded systems and corresponding countermeasures need to be implemented. In this work, we demonstrate how the ...
Detecting flawed masking schemes with leakage detection tests
side-channel analysis DPA masking
2016/3/16
Masking is a popular countermeasure to thwart side-channel attacks on embedded systems. Many proposed masking schemes, even carrying ``security proofs'', are eventually broken because they are flawed ...
How Fast Can Higher-Order Masking Be in Software?
Side-Channel Countermeasures Higher-Order Masking Bitslice
2016/3/9
It is widely accepted that higher-order masking is a sound countermeasure to protect
implementations of block ciphers against side-channel attacks. The main issue while designing such
a countermeasu...
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
side-channel analysis leakage resilience security evaluations
2016/1/26
Securing cryptographic implementations against side-channel
attacks is one of the most important challenges in modern cryptography.
Many countermeasures have been introduced for this purpose, and an...
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
Masking countermeasure trans-masking fault detection
2016/1/7
Secure elements, such as smartcards or trusted platform modules
(TPMs), must be protected against implementation-level attacks.
Those include side-channel and fault injection attacks. We introduce
...
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Side-channel attack first-order countermeasure arithmetic to Boolean conversion
2016/1/6
A general method to protect a cryptographic algorithm against side-channel attacks consists in masking all intermediate variables with a random value. For cryptographic algorithms combining Boolean op...
In this paper, we study the problem of automatically verifying higherorder
masking countermeasures. This problem is important in practice (weaknesses
have been discovered in schemes that were though...
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
side-channel analysis threshold implementation Boolean masking
2016/1/4
A common countermeasure to thwart side-channel analysis
attacks is algorithmic masking. For this, algorithms that mix Boolean
and arithmetic operations need to either apply two different masking
sc...
Masking is a popular countermeasure against side channel
attacks. Many practical works use Boolean masking because of its simplicity,
ease of implementation and comparably low performance overhead.
...
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device
side-channel analysis masking security proofs
2016/1/4
We investigate the relationships between theoretical studies
of leaking cryptographic devices and concrete security evaluations
with standard side-channel attacks. Our contributions are in four part...
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Side-channel analysis countermeasures performance evaluations
2015/12/30
. In this paper, we evaluate the performances of state-of-theart
higher-order masking schemes for the AES. Doing so, we pay a particular
attention to the comparison between specialized solutions int...
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Masking Composition Formal Methods
2015/12/30
The prevailing approach for building masked algorithms that can resist
higher-order differential power analysis is to develop gadgets, that is, masked
gates used as atomic blocks, that securely impl...
In this paper we investigate relations between several masking schemes. We show
that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold
Implementations and the Tric...
We present DPA attacks on an ARM Cortex-A8 processor running at 1 GHz. This high-end processor is typically found in portable devices such as phones and tablets. In our case, the processor sits in a s...
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Threshold Implementation McEliece Cryptosystem QC-MDPC Codes
2015/12/22
Instantiations of the McEliece cryptosystem which are considered computationally secure
even in a post-quantum era still require hardening against side channel attacks for practical applications.
Re...