2017
DOI: 10.1109/tc.2016.2635650
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic Analysis of Higher-Order Side Channel Countermeasures

Abstract: In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order. To achieve this goal, we promote the search for vulnerabilities from a statistical problem to a purely symbolical one and then provide a method for reasoning a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(21 citation statements)
references
References 18 publications
0
21
0
Order By: Relevance
“…In terms of accuracy, numerous unknowns occurred in the experimental results of [47] and two obviously perfect masking cases were not proved in [6]. Finally, although higher-order masking were addressed by prior techniques [13], they were limited to linear operations, whereas our method can handle both first-order and higher-order masking with non-linear operations.…”
Section: Related Workmentioning
confidence: 93%
See 4 more Smart Citations
“…In terms of accuracy, numerous unknowns occurred in the experimental results of [47] and two obviously perfect masking cases were not proved in [6]. Finally, although higher-order masking were addressed by prior techniques [13], they were limited to linear operations, whereas our method can handle both first-order and higher-order masking with non-linear operations.…”
Section: Related Workmentioning
confidence: 93%
“…We first introduce our distribution types, which are inspired by prior work in [6,13,47], together with some auxiliary data structures; then, we present our inference rules.…”
Section: The Semantic Type Inference Systemmentioning
confidence: 99%
See 3 more Smart Citations