Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
One important open question in side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security proofs. For attacks exploiting a divide-and-conquer strategy, the answer is negative: only the leakages correspo...
Main Authors: | Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2020-08-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/8682 |
Similar Items
-
Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations
by: Olivier Bronchain, et al.
Published: (2020-03-01) -
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB
by: Francesco Berti, et al.
Published: (2021-11-01) -
Bitslice Masking and Improved Shuffling:
by: Melissa Azouaoui, et al.
Published: (2022-02-01) -
Efficient and Private Computations with Code-Based Masking
by: Weijia Wang, et al.
Published: (2020-03-01) -
Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium
by: Jonghyeok Lee, et al.
Published: (2023-01-01)