2015
DOI: 10.1007/978-3-662-49099-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Amplification of Noisy Leakages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…It can be checked that the parity of Hw(x⊕R, R) equals the parity of Hw(x) which reveals one full bit of information on x (hence the hiddenness assumption collapses). Those considerations are reminiscent to recent works proposing to use additive masking in prime fields for low-noise applications [DFS16,MMMS22].…”
Section: Simple Definition and Examplesmentioning
confidence: 84%
“…It can be checked that the parity of Hw(x⊕R, R) equals the parity of Hw(x) which reveals one full bit of information on x (hence the hiddenness assumption collapses). Those considerations are reminiscent to recent works proposing to use additive masking in prime fields for low-noise applications [DFS16,MMMS22].…”
Section: Simple Definition and Examplesmentioning
confidence: 84%
“…This is especially true in the context of low-end embedded devices [BS21] and in the context of hardware implementations when static leakage is exploitable (see the following subsection). Interestingly, this issue has also been considered from the theoretical viewpoint by Dziembowski et al, who studied the amplification of noisy leakages and conclude that prime-order fields are better suited for low-noise masking [DFS16]. A recent report confirms the practical impact of this observation by providing first information theoretic evaluations of a concrete cryptographic primitive additively masked with a prime-field encoding [MMMS22].…”
Section: Masking With Insufficient Noisementioning
confidence: 99%
“…We insist that, as illustrated by Figure 6, these benefits are not caused by a reduced Signal-to-Noise Ratio (SNR) in the prime-field case, but indeed by the algebraic incompatibility of leakage function and prime-field operations (since the SNRs per share are similar for both encodings). We also note that the theoretical security analysis of prime masking in [DFS16] only requires the leakage function to be non-injective (which then leads to trivial attacks anyway) for security amplification. So the interest of prime masking should be quite technology-independent.…”
Section: Dynamic Power Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to circumvent this issue, Dziembowski et al showed that the finite group in which the masking operates should not have any non-trivial subgroup, which characterizes prime fields [20]. This seed result has recently triggered an interest for prime-field masking in symmetric cryptography.…”
Section: Introductionmentioning
confidence: 99%