A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Verified Proofs of Higher-Order Masking
[chapter]
2015
Lecture Notes in Computer Science
Masking countermeasure which aims to render partial power consumption traces independent from the secrets by randomizing them each sensitive value x is replaced in the computations by t + 1 random variables x 0 , ..., x t such that x = x 0 ... x t generally, we consider that an adversary that observes at most t program variables should not be able to recover x t is called masking order or security order 04-28-2015 5 / 17
doi:10.1007/978-3-662-46800-5_18
fatcat:ekaweuptbzfp3a3pcllqqplhpu