International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–
Eprint
https://eprint.iacr.org/2010/385
Emmanuel Prouff Robert McEvoy
The use of random permutation tables as a side-channel attack countermeasure was recently proposed by Coron [6]. The countermeasure operates by ensuring that during the execution of an algorithm, each intermediate variable...
received 7 Jul 2010
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=18591
Emmanuel Prouff Robert P. McEvoy
Ches 2009
IACR CHES 2009
https://iacr.org/archive/ches2009/ches2009.html
CHES 2009: Kris Gaj and Christophe Clavier (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Proceedings. CHES 2009 Lausanne,...
Workshop on Cryptographic Hardware and Embedded Systems 2009 (CHES 2009)
https://iacr.org/workshops/ches/ches2009/accepted.html
CHES Home CHES 2009 PROGRAM ACCEPTED PAPERS PAPER SUBMISSION SYSTEM RUMP SESSION POSTERS CALL FOR PAPERS HOT TOPIC SUBMISSION HOT TOPIC SESSION CFP CALL FOR SPONSORS GUIDE BOOK REGISTRATION ACCOMMODATION VENUE VISA AUTHOR...
Workshop on Cryptographic Hardware and Embedded Systems 2009 (CHES 2009)
https://iacr.org/workshops/ches/ches2009/program2009.html
CHES Home CHES 2009 PROGRAM ACCEPTED PAPERS PAPER SUBMISSION SYSTEM RUMP SESSION POSTERS CALL FOR PAPERS HOT TOPIC SUBMISSION HOT TOPIC SESSION CFP CALL FOR SPONSORS GUIDE BOOK REGISTRATION ACCOMMODATION VENUE VISA AUTHOR...
Higher Order Masking of Look-up Tables
Eprint
https://eprint.iacr.org/2013/700
Jean-Sebastien Coron
We describe a new algorithm for masking look-up tables of block-ciphers at any order, as a countermeasure against side-channel attacks. Our technique is a generalization of the classical randomized table countermeasure...
last revised 5 Feb 2014
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols - Extended Version
Eprint
https://eprint.iacr.org/2011/413
Thomas Roche Emmanuel Prouff
Higher-order side channel attacks (HO-SCA) is a powerful technique against cryptographic implementations and the design of appropriate countermeasures is nowadays an important topic. In parallel, another class of attacks,...
last revised 4 Aug 2014
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
Eprint
https://eprint.iacr.org/2009/185
Robert P. McEvoy Michael Tunstall Claire Whelan Colin C. Murphy William P. Marnane
All-or-Nothing Encryption was introduced by Rivest as a countermeasure to brute force key search attacks. This work identifies a new application for All-or-Nothing Transforms, as a protocol-level countermeasure to Differential...
received 30 Apr 2009
A First-Order Leak-Free Masking Countermeasure
Eprint
https://eprint.iacr.org/2012/028
Houssem MAGHREBI Emmanuel PROUFF Sylvain GUILLEY Jean-Luc DANGER
One protection of cryptographic implementations against side-channel attacks is the masking of the sensitive variables. In this article, we present a first-order masking that does not leak information when the registers change...
received 19 Jan 2012
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Eprint
https://eprint.iacr.org/2016/540
Alberto Battistello Jean-Sebastien Coron Emmanuel Prouff Rina Zeitoun
A common countermeasure against side-channel attacks consists in using the masking scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further generalized by Rivain and Prouff at CHES 2010. The...
last revised 27 Jul 2016
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version --
Eprint
https://eprint.iacr.org/2016/183
Houssem Maghrebi Victor Servant Julien Bringer
Side-channel attacks are an important concern for the security of cryptographic algorithms. To counteract it, a recent line of research has investigated the use of software encoding functions such as dual-rail rather than the...
last revised 22 Feb 2016
IACR CHES 2010
https://iacr.org/archive/ches2010/index.html
CHES 2010: François-Xavier Standaert and Stefan Mangard (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2010, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010 Proceedings. CHES 2010...
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings
Eprint
https://eprint.iacr.org/2011/425
Laurie Genelle Emmanuel Prouff Michaël Quisquater
Higher-order side channel attacks is a class of powerful techniques against cryptographic implementations. Their complexity grows exponentially with the order, but for small orders (e.g. 2 and 3) recent studies have...
last revised 26 Jul 2012
Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version)
Eprint
https://eprint.iacr.org/2015/119
Alexandre Duc Sebastian Faust François-Xavier Standaert
We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the...
last revised 11 Mar 2019
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Eprint
https://eprint.iacr.org/2014/673
Victor Lomné Emmanuel Prouff Matthieu Rivain Thomas Roche Adrian Thillard
The resistance of a cryptographic implementation with regards to side-channel analysis is often quantified by measuring the success rate of a given attack. This approach cannot always be followed in practice, especially when...
last revised 11 Sep 2014
Higher-Order Side Channel Security and Mask Refreshing
Eprint
https://eprint.iacr.org/2015/359
Jean-Sebastien Coron Emmanuel Prouff Matthieu Rivain Thomas Roche
Masking is a widely used countermeasure to protect block cipher implementations against side-channel attacks. The principle is to split every sensitive intermediate variable occurring in the computation into d + 1 shares,...
received 21 Apr 2015
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
Eprint
https://eprint.iacr.org/2012/358
Gilles Piret Thomas Roche Claude Carlet
Many papers deal with the problem of constructing an efficient masking scheme for existing block ciphers. We take the reverse approach: that is, given a proven masking scheme (Rivain and Prouff, CHES 2010) we design a block...
last revised 10 Jul 2012
IACR CHES 2012
https://iacr.org/archive/ches2012/ches2012-index.html
CHES 2012: Patrick Schaumont and Emmanuel Prouff (Eds.): Cryptographic Hardware and Embedded Systems - 14th International Workshop - CHES 2012, Leuven, Belgium September 9-12, 2012 Proceedings. CHES 2012 Leuven, Belgium,...
IACR CHES 2015
https://iacr.org/archive/ches2015/ches2015-index.html
CHES 2015: Helena Handschuh and Tim Güneysu (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2015 17th International Workshop Saint-Malo, France, September 13-16, 2015 Proceedings. CHES 2015 Preface by Helena...
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version
Eprint
https://eprint.iacr.org/2004/187
Mathieu Ciet Michael Neve Eric Peeters Jean-Jacques Quisquater
In this paper, we present a new parallel architecture to avoid side-channel analyses such as: timing attack, simple/differential power analysis, fault induction attack and simple/differential electromagnetic analysis. We use a...
received 5 Aug 2004
Next ►