Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on...

Full description

Bibliographic Details
Main Authors: John Gaspoz, Siemen Dhooghe
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2023-03-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/10280