2018
DOI: 10.1007/978-3-319-75208-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Connecting and Improving Direct Sum Masking and Inner Product Masking

Abstract: Direct Sum Masking (DSM) and Inner Product (IP) masking are two types of countermeasures that have been introduced as alternatives to simpler (e.g., additive) masking schemes to protect cryptographic implementations against side-channel analysis. In this paper, we first show that IP masking can be written as a particular case of DSM. We then analyze the improved security properties that these (more complex) encodings can provide over Boolean masking. For this purpose, we introduce a slight variation of the pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
25
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 16 publications
(29 citation statements)
references
References 37 publications
1
25
0
Order By: Relevance
“…• Bit-level security order d b : in practice, each bit of sensitive variable can be investigated independently or/and several bits can be evaluated jointly. We consider here the number of bits that can be probed by attackers, which is consistent with the bit-level probing model proposed by Poussier et al [22].…”
Section: Security Order Regarding Side-channel Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…• Bit-level security order d b : in practice, each bit of sensitive variable can be investigated independently or/and several bits can be evaluated jointly. We consider here the number of bits that can be probed by attackers, which is consistent with the bit-level probing model proposed by Poussier et al [22].…”
Section: Security Order Regarding Side-channel Analysismentioning
confidence: 99%
“…• Inner Product Masking (IPM) [2] is a word-oriented (e.g., byte-oriented) masking scheme, equipped with universal operations (namely, addition and multiplication). It is optimized to resist attacks at both word-level and bit-level probing model [22], which is suitable for computing cryptographic algorithms that are subject to high-order side-channel analysis.…”
Section: State-of-the-art On Side-channel and Fault Protectionmentioning
confidence: 99%
See 3 more Smart Citations