2020
DOI: 10.1007/978-3-030-56784-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Random Probing Security: Verification, Composition, Expansion and New Constructions

Abstract: The masking countermeasure is among the most powerful countermeasures to counteract side-channel attacks. Leakage models have been exhibited to theoretically reason on the security of such masked implementations. So far, the most widely used leakage model is the probing model defined by Ishai, Sahai, and Wagner at (CRYPTO 2003). While it is advantageously convenient for security proofs, it does not capture an adversary exploiting full leakage traces as, e.g., in horizontal attacks. Those attacks target the mul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Notice that the dependency of the noise requirement in d is tight, since it depicts the potential ability of an adversary to increase its success of recovering each share through horizontal attacks, as argued by Battistello et al [7] and Grosso and Standaert [33]. Nevertheless, it is still possible to relax this dependency by using other multiplication gadgets [1,3,2,8,30,31].…”
Section: Comparison With Related Workmentioning
confidence: 97%
See 2 more Smart Citations
“…Notice that the dependency of the noise requirement in d is tight, since it depicts the potential ability of an adversary to increase its success of recovering each share through horizontal attacks, as argued by Battistello et al [7] and Grosso and Standaert [33]. Nevertheless, it is still possible to relax this dependency by using other multiplication gadgets [1,3,2,8,30,31].…”
Section: Comparison With Related Workmentioning
confidence: 97%
“…This direct approach has gained the reputation of being "not convenient" [8,10] to work with, up to the point that most masking security proofs are now established in much simpler yet unrealistic threat models [34,6,8,9,17], relying on a non-tight reduction from the noisy leakage model to such simpler threat models [25]. As a result, only three previous works tackled masking security proofs through this direct way so far.…”
Section: Provable Security Of Maskingmentioning
confidence: 99%
See 1 more Smart Citation
“…VRAPS, an automatic framework algorithm from [23], is a security verification tool that considers the random probing model for the sake of capturing horizontal attacks which exploit full leakage traces. However, this tool only works on small circuits, i.e., proving the security of gadgets.…”
Section: Security Verificationmentioning
confidence: 99%