A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Masking Proofs Are Tight and How to Exploit it in Security Evaluations
[chapter]
2018
Lecture Notes in Computer Science
Evaluating the security level of a leaking implementation against side-channel attacks is a challenging task. This is especially true when countermeasures such as masking are implemented since in this case: (i) the amount of measurements to perform a key recovery may become prohibitive for certification laboratories, and (ii) applying optimal (multivariate) attacks may be computationally intensive and technically challenging. In this paper, we show that by taking advantage of the tightness of
doi:10.1007/978-3-319-78375-8_13
fatcat:7nfrs7mc2jh35ovsjw7m6suqay