2018
DOI: 10.46586/tches.v2018.i1.118-141
|View full text |Cite
|
Sign up to set email alerts
|

Linear Repairing Codes and Side-Channel Attacks

Abstract: To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to share the sensitive data. Applying the same principles used against the classical Boolean sharing, all these works have assumed that the most efficient attack strategy was to exploit the minimum number of shares required to rebuild the sensitive value; which is d +… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 18 publications
1
4
0
Order By: Relevance
“…For the first time, we quantify the impact of combining different public points in SSS-based masking in the context of side-channel analysis and show that more shares leak more information (given a specific t). In particular, our coding-theoretic approach can exactly depict the observations made in [CMP18]. Using MI, we present the quantitative results of information leakages in SSS-based masking, which again validate our unified approach.…”
Section: Optimal Public Points For Sss-based Polynomial Maskingsupporting
confidence: 62%
See 3 more Smart Citations
“…For the first time, we quantify the impact of combining different public points in SSS-based masking in the context of side-channel analysis and show that more shares leak more information (given a specific t). In particular, our coding-theoretic approach can exactly depict the observations made in [CMP18]. Using MI, we present the quantitative results of information leakages in SSS-based masking, which again validate our unified approach.…”
Section: Optimal Public Points For Sss-based Polynomial Maskingsupporting
confidence: 62%
“…As observed in [CMP18], the public points in SSS play a significant role in the sidechannel resistance of SSS-based masking schemes. In fact, this problem of public points is inherent in the SSS scheme and can be dated back to Massey [Mas93] who claimed that SSS scheme "can be attacked with the well-developed tools of algebraic coding theory".…”
Section: Public Points In Sss and Polynomial Maskingmentioning
confidence: 91%
See 2 more Smart Citations
“…Byte transitions can be taken into consideration if, for instance, 256 2 = 65536 templates are profiled on the pair of (initial, final) values. During the attack phase, we leverage an adaption of the Gaussian mixture model as in [CMP18,CS21] by using real measurements. We choose one Point of Interest (POI) for each share and the selection strategy is to designate the one which has the largest and most consistent Signal-to-Noise Ratio (SNR), which is defined for each share as in [DFS15].…”
Section: Evaluation Strategy and Experimental Setupmentioning
confidence: 99%