Feb. 27, 2024, 10:54 a.m. |

IACR News www.iacr.org

ePrint Report: From Random Probing to Noisy Leakages Without Field-Size Dependence

Gianluca Brian, Stefan Dziembowski, Sebastian Faust


Side channel attacks are devastating attacks targeting cryptographic implementations. To protect against these attacks, various countermeasures have been proposed -- in particular, the so-called masking scheme. Masking schemes work by hiding sensitive information via secret sharing all intermediate values that occur during the evaluation of a cryptographic implementation. Over the last decade, there has been broad interest in designing and formally analyzing such …

attacks brian called channel countermeasures cryptographic eprint report information masking noisy protect random report sensitive sensitive information size targeting work

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)