Feb. 27, 2024, 10:54 a.m. |

IACR News www.iacr.org

ePrint Report: From Random Probing to Noisy Leakages Without Field-Size Dependence

Gianluca Brian, Stefan Dziembowski, Sebastian Faust


Side channel attacks are devastating attacks targeting cryptographic implementations. To protect against these attacks, various countermeasures have been proposed -- in particular, the so-called masking scheme. Masking schemes work by hiding sensitive information via secret sharing all intermediate values that occur during the evaluation of a cryptographic implementation. Over the last decade, there has been broad interest in designing and formally analyzing such …

attacks brian called channel countermeasures cryptographic eprint report information masking noisy protect random report sensitive sensitive information size targeting work

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)