Verified Proofs of Higher-Order Masking [chapter]

Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
2015 Lecture Notes in Computer Science  
Masking countermeasure which aims to render partial power consumption traces independent from the secrets by randomizing them each sensitive value x is replaced in the computations by t + 1 random variables x 0 , ..., x t such that x = x 0 ... x t generally, we consider that an adversary that observes at most t program variables should not be able to recover x t is called masking order or security order 04-28-2015 5 / 17
doi:10.1007/978-3-662-46800-5_18 fatcat:ekaweuptbzfp3a3pcllqqplhpu