2014
DOI: 10.1007/978-3-662-44709-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Secure Conversion between Boolean and Arithmetic Masking of Any Order

Abstract: An effective countermeasure against side-channel attacks is to mask all sensitive intermediate variables with one (or more) random value(s). When a cryptographic algorithm involves both arithmetic and Boolean operations, it is necessary to convert from arithmetic masking to Boolean masking and vice versa. At CHES 2001, Goubin introduced two algorithms for secure conversion between arithmetic and Boolean masks, but his approach can only be applied to first-order masking. In this paper, we present and evaluate n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 51 publications
(41 citation statements)
references
References 19 publications
0
32
0
Order By: Relevance
“…We used three different word sizes (namely = 1, 2, 4) for the second-order conversion algorithm and a word size of = 4 for first-order masked addition 7 . In order to compare our results with that of existing techniques, we also implemented the Coron-Großschädl-Vadnala (CGV) method [3] for second-order conversion and the Karroumi-Richard-Joye (KRJ) method [7] for first-order secure addition. As expected, the improvement in case of the second-order conversion algorithms is significant due to the reduction of the number of shares from five to three.…”
Section: Implementation Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…We used three different word sizes (namely = 1, 2, 4) for the second-order conversion algorithm and a word size of = 4 for first-order masked addition 7 . In order to compare our results with that of existing techniques, we also implemented the Coron-Großschädl-Vadnala (CGV) method [3] for second-order conversion and the Karroumi-Richard-Joye (KRJ) method [7] for first-order secure addition. As expected, the improvement in case of the second-order conversion algorithms is significant due to the reduction of the number of shares from five to three.…”
Section: Implementation Resultsmentioning
confidence: 99%
“…However, almost all secure conversion techniques reported in the literature are only applicable to first-order masking [4][5][6][7]10]. Among the few exceptions is the second-order conversion scheme due to Vadnala and Großschädl [13] and the recent higher-order conversion scheme by Coron, Großschädl and Vadnala [3]. We outline both schemes below.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations