Theory and practice of a leakage resilient masking scheme

37Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A recent trend in cryptography is to formally prove the leakage resilience of cryptographic implementations - that is, one formally shows that a scheme remains provably secure even in the presence of side channel leakage. Although many of the proposed schemes are secure in a surprisingly strong model, most of them are unfortunately rather inefficient and come without practical security evaluations nor implementation attempts. In this work, we take a further step towards closing the gap between theoretical leakage resilient cryptography and more practice-oriented research. In particular, we show that masking countermeasures based on the inner product do not only exhibit strong theoretical leakage resilience, but moreover provide better practical security or efficiency than earlier masking countermeasures. We demonstrate the feasibility of inner product masking by giving a secured implementation of the AES for an 8-bit processor. © International Association for Cryptologic Research 2012.

Cite

CITATION STYLE

APA

Balasch, J., Faust, S., Gierlichs, B., & Verbauwhede, I. (2012). Theory and practice of a leakage resilient masking scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7658 LNCS, pp. 758–775). https://doi.org/10.1007/978-3-642-34961-4_45

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free