Leakage Squeezing Revisited Vincent Grosso 1 , Fran cois-Xavier - - PowerPoint PPT Presentation

leakage squeezing revisited
SMART_READER_LITE
LIVE PREVIEW

Leakage Squeezing Revisited Vincent Grosso 1 , Fran cois-Xavier - - PowerPoint PPT Presentation

Leakage Squeezing Revisited Vincent Grosso 1 , Fran cois-Xavier Standaert 1 , Emmanuel Prouff 2 . 1 ICTEAM/ELEN/Crypto Group, Universit e catholique de Louvain, Belgium. 2 ANSSI, 51 Bd de la Tour-Maubourg, 75700 Paris 07 SP, France. CARDIS


slide-1
SLIDE 1

Leakage Squeezing Revisited

Vincent Grosso1, Fran¸ cois-Xavier Standaert1, Emmanuel Prouff2.

1 ICTEAM/ELEN/Crypto Group, Universit´

e catholique de Louvain, Belgium.

2 ANSSI, 51 Bd de la Tour-Maubourg, 75700 Paris 07 SP, France.

CARDIS 2013, Berlin.

slide-2
SLIDE 2

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

1 / 26

Secret Sharing

slide-3
SLIDE 3

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

1 / 26

Secret Sharing

slide-4
SLIDE 4

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

1 / 26

Secret Sharing

P( | )=P( )

slide-5
SLIDE 5

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

2 / 26

Boolean Secret Sharing

Let X be a variable and M a random value uniformly chosen among the possible values of X.

slide-6
SLIDE 6

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

2 / 26

Boolean Secret Sharing

Let X be a variable and M a random value uniformly chosen among the possible values of X. Then X can be shared with the vector (X ⊕ M, M).

slide-7
SLIDE 7

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

2 / 26

Boolean Secret Sharing

Let X be a variable and M a random value uniformly chosen among the possible values of X. Then X can be shared with the vector (X ⊕ M, M). M is random ⇒ no information on X is available from the

  • bservation of M.
slide-8
SLIDE 8

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

2 / 26

Boolean Secret Sharing

Let X be a variable and M a random value uniformly chosen among the possible values of X. Then X can be shared with the vector (X ⊕ M, M). M is random ⇒ no information on X is available from the

  • bservation of M.

X ⊕ M one-time-pad of X ⇒ no information on X is available from the observation of X ⊕ M.

slide-9
SLIDE 9

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

3 / 26

Masking ≃ Computing on Shared Values

Traces contain information plus some noise.

slide-10
SLIDE 10

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

3 / 26

Masking ≃ Computing on Shared Values

Unprotected device: unidimensional leakage is sufficient to mount an attack.

slide-11
SLIDE 11

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

3 / 26

Masking ≃ Computing on Shared Values

Protected software device with 2 shares: ideally bi- dimensional leakages are sufficient to mount an attack.

slide-12
SLIDE 12

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

3 / 26

Masking ≃ Computing on Shared Values

Protected software device with 3 shares: ideally tri- dimensional leakages are sufficient to mount an attack.

slide-13
SLIDE 13

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

3 / 26

Masking ≃ Computing on Shared Values

Dimension of an attack : number of leakage points used.

slide-14
SLIDE 14

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

4 / 26

Order (statistical)

Let Xi be r random variables, then the central mixed moment of orders d1, . . . , dr is defined by: E((X1 − E(X1))d1 × · · · × (Xr − E(Xr))dr).

slide-15
SLIDE 15

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

4 / 26

Order (statistical)

Let Xi be r random variables, then the central mixed moment of orders d1, . . . , dr is defined by: E((X1 − E(X1))d1 × · · · × (Xr − E(Xr))dr). The order of an attack is the smallest statical moment

  • rder (d =

i di) used in the attack.

slide-16
SLIDE 16

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

4 / 26

Order (statistical)

Let Xi be r random variables, then the central mixed moment of orders d1, . . . , dr is defined by: E((X1 − E(X1))d1 × · · · × (Xr − E(Xr))dr). The order of an attack is the smallest statical moment

  • rder (d =

i di) used in the attack.

If we have noisy random variables, the moment becomes harder to estimate as the order increases.

slide-17
SLIDE 17

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

5 / 26

Application to attack

⊲ Order

↔ data complexity.

⊲ Dimension

↔ computational complexity.

slide-18
SLIDE 18

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

5 / 26

Application to attack

⊲ Order

↔ data complexity.

⊲ Dimension

↔ computational complexity. The data complexity of a successful attack increases exponentially with the order of the attack (with noise as a basis).

slide-19
SLIDE 19

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

6 / 26

Outline

  • 1. Leakage squeezing
  • 2. Assumption fulfilled
  • 3. On the adversary condition
  • 4. On the physical condition
slide-20
SLIDE 20

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

7 / 26

Outline

  • 1. Leakage squeezing
  • 2. Assumption fulfilled
  • 3. On the adversary condition
  • 4. On the physical condition
slide-21
SLIDE 21

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

8 / 26

Motivation

⊲ Masking security holds if all masks are uniformly

distributed ⇒ strong randomness requirements in masked implementation. Leakage squeezing proposes to reduce the amount of entropy (i.e. the number of masks).

⊲ Less masks can lead to more efficient implementation ⊲ Preserved security order under two conditions:

  • Unidimensional leakage.
  • Linear leakage.
slide-22
SLIDE 22

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

9 / 26

On the security conditions

⊲ Unidimensional leakage only 1 share, adversarial

condition:

  • points of interest are difficult to find
  • implementation always leak on all shares

What happen if adversary obtain leakage on both shares?

slide-23
SLIDE 23

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

9 / 26

On the security conditions

⊲ Unidimensional leakage only 1 share, adversarial

condition:

  • points of interest are difficult to find
  • implementation always leak on all shares

What happen if adversary obtain leakage on both shares? Similar security as uniform masking :)

slide-24
SLIDE 24

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

9 / 26

On the security conditions

⊲ Unidimensional leakage only 1 share, adversarial

condition:

  • points of interest are difficult to find
  • implementation always leak on all shares

What happen if adversary obtain leakage on both shares? Similar security as uniform masking :)

⊲ Linear leakage, physical condition:

  • classical hypothesis (Hamming weight leakage) for

adversary but not for evaluation

  • cryptographic designers can hardly control the

leakage function

What happen if the leakage function is not linear?

slide-25
SLIDE 25

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

9 / 26

On the security conditions

⊲ Unidimensional leakage only 1 share, adversarial

condition:

  • points of interest are difficult to find
  • implementation always leak on all shares

What happen if adversary obtain leakage on both shares? Similar security as uniform masking :)

⊲ Linear leakage, physical condition:

  • classical hypothesis (Hamming weight leakage) for

adversary but not for evaluation

  • cryptographic designers can hardly control the

leakage function

What happen if the leakage function is not linear? The security order decrease, depending on the degree

  • f the leakage function :(
slide-26
SLIDE 26

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

10 / 26

Target

C12 = {0x03, 0x18, 0x3f, 0x55, 0x60, 0x6e, 0x8c, 0xa5, 0xb2, 0xcb, 0xd6, 0xf9} [NGD11]. Univariate security of

  • rder 2, if linear leakage.

C16 = {0x10, 0x1f, 0x26, 0x29, 0x43, 0x4c, 0x75, 0x7a, 0x85, 0x8a, 0xb3, 0xbc, 0xd6, 0xd9, 0xe0, 0xef} [BCG13]. Univariate security of order 3, if linear leakage.

slide-27
SLIDE 27

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

11 / 26

Modification of hypothesis

⊲ Multivariate (higher dimension) attacks. ⇒

Adversarial condition. l1 = l(X ⊕ m) + N1,

slide-28
SLIDE 28

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

11 / 26

Modification of hypothesis

⊲ Multivariate (higher dimension) attacks. ⇒

Adversarial condition. l1 = l(X ⊕ m) + N1, l2 = l(m) + N2

slide-29
SLIDE 29

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

11 / 26

Modification of hypothesis

⊲ Multivariate (higher dimension) attacks. ⇒

Adversarial condition. l1 = l(X ⊕ m) + N1, l2 = l(m) + N2

⊲ Polynomial leakage. ⇒ Physical condition.

Let X be an internal value, Xi denotes the value of the ith bit of X. For a linear leakage ∃{ai}i s.t. l(X) =

i aiXi

slide-30
SLIDE 30

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

11 / 26

Modification of hypothesis

⊲ Multivariate (higher dimension) attacks. ⇒

Adversarial condition. l1 = l(X ⊕ m) + N1, l2 = l(m) + N2

⊲ Polynomial leakage. ⇒ Physical condition.

Let X be an internal value, Xi denotes the value of the ith bit of X. For a polynomial leakage ∃{ai}i, {bi,j}i,j, . . . s.t. l(X) =

i aiXi

+

i

  • j bi,jXi × Xj +

i

  • j
  • k ci,j,kXi × Xj × Xk

For uniform masking, polynomial leakage does not mix different shares. It has thus no incidence on security

  • rder.
slide-31
SLIDE 31

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

12 / 26

Framework

⊲ Mutual information.

slide-32
SLIDE 32

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

12 / 26

Framework

⊲ Mutual information.

K

slide-33
SLIDE 33

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

12 / 26

Framework

⊲ Mutual information.

L

slide-34
SLIDE 34

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

12 / 26

Framework

⊲ Mutual information.

L K

slide-35
SLIDE 35

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

12 / 26

Framework

⊲ Mutual information.

L K The maximum information available.

slide-36
SLIDE 36

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

12 / 26

Framework

⊲ Perceived information.

L K The maximum information available.

slide-37
SLIDE 37

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

12 / 26

Framework

⊲ Perceived information.

L K The maximum information available.

⊲ Security analysis.

Resistance against nowadays adversary.

slide-38
SLIDE 38

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

13 / 26

Intuition on information analysis

10−2 10−1 100 101 10−4 10−3 10−2 10−1 100 slope 1 slope 2

noise variance perceived information

unprotected masked Gaussian mixture masked Gaussian template

Information analysis can help to find the order of the small- est informative moment. E((X + σ2)d)

slide-39
SLIDE 39

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

13 / 26

Intuition on information analysis

10−2 10−1 100 101 10−4 10−3 10−2 10−1 100 slope 1 slope 2

noise variance perceived information

unprotected masked Gaussian mixture masked Gaussian template

For unprotected device mean are different. For protected device mean are equals but covariance are different. Having the full distribution can help to discriminate keys ⇒ information in higher order.

slide-40
SLIDE 40

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

13 / 26

Intuition on information analysis

10−2 10−1 100 101 10−4 10−3 10−2 10−1 100 slope 1 slope 2

noise variance perceived information

unprotected masked Gaussian mixture masked Gaussian template

For unprotected device difference is still in the mean. For protected full distribution and Gaussian template model are close ⇒ few information in higher order.

slide-41
SLIDE 41

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

14 / 26

Outline

  • 1. Leakage squeezing
  • 2. Assumption fulfilled
  • 3. On the adversary condition
  • 4. On the physical condition
slide-42
SLIDE 42

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

15 / 26

Hypothesis

⊲ univariate leakage on 1 share :

l1 = l(X ⊕ m) + N

⊲ leakage function is linear (Hamming weight)

slide-43
SLIDE 43

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

16 / 26

Univariate case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1

noise variance perceived information

unprotected

l1 = Hw(X ⊕ m) + N

slide-44
SLIDE 44

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

16 / 26

Univariate case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1 s l

  • p

e 1

noise variance perceived information

unprotected C ′

12 Gaussian mixture

If random subset is used, then information about the key is available in the mean.

slide-45
SLIDE 45

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

16 / 26

Univariate case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1 s l

  • p

e 1 s l

  • p

e 3

noise variance perceived information

unprotected C ′

12 Gaussian mixture

C12 Gaussian mixture

If carefully chosen subset is used, then information about the key is available in higher moment.

slide-46
SLIDE 46

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

16 / 26

Univariate case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1 s l

  • p

e 1 s l

  • p

e 3 slope 4

noise variance perceived information

unprotected C ′

12 Gaussian mixture

C12 Gaussian mixture C16 Gaussian mixture

If carefully chosen subset is used, then information about the key is available in higher moment.

slide-47
SLIDE 47

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

16 / 26

Univariate case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1 s l

  • p

e 1 s l

  • p

e 3 slope 4

noise variance perceived information

unprotected C ′

12 Gaussian mixture

C12 Gaussian mixture C16 Gaussian mixture

Such an attack is impossible for masking with 256 masks. Since only 1 share is observed.

slide-48
SLIDE 48

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

17 / 26

Conclusion classical Hypothesis

⊲ C12: information in 3rd moment ⊲ C16: information in 4th moment

As expected from previous works on leakage squeezing

slide-49
SLIDE 49

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

18 / 26

Outline

  • 1. Leakage squeezing
  • 2. Assumption fulfilled
  • 3. On the adversary condition
  • 4. On the physical condition
slide-50
SLIDE 50

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

19 / 26

Hypothesis

⊲ bivariate leakage on both shares :

l1 = l(X ⊕ m) + N1, l2 = l(m) + N2

⊲ leakage function is linear (Hamming weight)

slide-51
SLIDE 51

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

20 / 26

Bivariate case

10−2 10−1 100 101 10−3 10−2 10−1 100 s l

  • p

e 2

noise variance perceived information

256 masks Gaussian mixture

l1 = Hw(X ⊕ m) + N1, l2 = Hw(m) + N2

slide-52
SLIDE 52

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

20 / 26

Bivariate case

10−2 10−1 100 101 10−3 10−2 10−1 100 s l

  • p

e 2

noise variance perceived information

256 masks Gaussian mixture 256 masks Gaussian template

Using Gaussian mixture allows us to obtain more informa- tion for low noise. ∃ useful information in higher moments that gradually vanishes as noise increasing.

slide-53
SLIDE 53

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

20 / 26

Bivariate case

10−2 10−1 100 101 10−3 10−2 10−1 100 s l

  • p

e 2 s l

  • p

e 1

noise variance perceived information

256 masks Gaussian mixture 256 masks Gaussian template C ′

12 Gaussian mixture

If random subset is used, then information about the key is available in the mean.

slide-54
SLIDE 54

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

20 / 26

Bivariate case

10−2 10−1 100 101 10−3 10−2 10−1 100 s l

  • p

e 2 s l

  • p

e 1

noise variance perceived information

256 masks Gaussian mixture 256 masks Gaussian template C ′

12 Gaussian mixture

C12 Gaussian mixture

If carefully chosen subset is used, then information about the key is available in the covariance matrix.

slide-55
SLIDE 55

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

20 / 26

Bivariate case

10−2 10−1 100 101 10−3 10−2 10−1 100 s l

  • p

e 2 s l

  • p

e 1

noise variance perceived information

256 masks Gaussian mixture 256 masks Gaussian template C ′

12 Gaussian mixture

C12 Gaussian mixture C16 Gaussian mixture

If carefully chosen subset is used, then information about the key is available in the covariance matrix.

slide-56
SLIDE 56

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

21 / 26

Conclusion adversarial condition

⊲ C12: information in 2nd moment ⊲ C16: information in 2nd moment ⊲ uniform masking: information in 2nd moment

The results are similar as for uniform masking :)

slide-57
SLIDE 57

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

22 / 26

Outline

  • 1. Leakage squeezing
  • 2. Assumption fulfilled
  • 3. On the adversary condition
  • 4. On the physical condition
slide-58
SLIDE 58

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

23 / 26

Hypothesis

⊲ univariate leakage on 1 share :

l1 = l(X ⊕ m) + N

⊲ leakage function is polynomial

l(X) =

  • i

aXi +

  • i
  • j

bXi × Xj +

  • i
  • j
  • k

cXi × Xj × Xk

slide-59
SLIDE 59

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

24 / 26

Polynomial leakage case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1

noise variance perceived information

unprotected Gaussian mixture

l(X) =

i aXi + i

  • j bXi × Xj +

i

  • j
  • k cXi × Xj × Xk
slide-60
SLIDE 60

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

24 / 26

Polynomial leakage case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1 slope 4

noise variance perceived information

unprotected Gaussian mixture C16 Hamming weight

If a = 1, b = 0 and c = 0 we have Hamming weight model.

slide-61
SLIDE 61

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

24 / 26

Polynomial leakage case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1 slope 4 slope 2

noise variance perceived information

unprotected Gaussian mixture C16 Hamming weight C16 a=0,b=1,c=0

If a = 0, b = 1 and c = 0 the degree of the leakage function is 2, hence the slope of the IT curve is 4

2.

slide-62
SLIDE 62

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

24 / 26

Polynomial leakage case

10−2 10−1 100 101 10−5 10−4 10−3 10−2 10−1 100 s l

  • p

e 1 slope 4 slope 2 slope 1.33

noise variance perceived information

unprotected Gaussian mixture C16 Hamming weight C16 a=0,b=1,c=0 C16 a=0,b=0,c=1

If a = 0, b = 0 and c = 1 the degree of the leakage function is 3, hence the slope of the IT curve is 4

3.

slide-63
SLIDE 63

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

25 / 26

Conclusion physical condition

⊲ Security order decreases with the degree of the

polynomial degp.

⊲ If the security for linear leakage function is of order d

then the security order becomes d′ = d/degp E((X)d) = E((X degp)d′)

⊲ No impact for uniform masking.

The security order is decreasing depending on the degree of the leakage function :(

slide-64
SLIDE 64

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

26 / 26

Conclusion

⊲ Assumption fulfilled:

  • uniform masking ⇒ no attack
  • leakage squeezing ⇒ attack of large order

As excepted from previous works on leakage squeezing.

slide-65
SLIDE 65

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

26 / 26

Conclusion

⊲ Assumption fulfilled:

  • uniform masking ⇒ no attack
  • leakage squeezing ⇒ attack of large order

As excepted from previous works on leakage squeezing.

⊲ On the adversary condition :

  • uniform masking ⇒ attack of second order
  • leakage squeezing ⇒ attack of second order with

small degradation for low noise

Similar security :)

slide-66
SLIDE 66

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

26 / 26

Conclusion

⊲ Assumption fulfilled:

  • uniform masking ⇒ no attack
  • leakage squeezing ⇒ attack of large order

As excepted from previous works on leakage squeezing.

⊲ On the adversary condition :

  • uniform masking ⇒ attack of second order
  • leakage squeezing ⇒ attack of second order with

small degradation for low noise

Similar security :)

⊲ On the physical condition :

  • uniform masking ⇒ no attack
  • leakage squeezing ⇒ smaller slope of the curve

Reduction of the slope depending on the degree of the leakage function:(

slide-67
SLIDE 67

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

26 / 26

Shivam Bhasin, Claude Carlet, and Sylvain Guilley. Theory of masking with codewords in hardware: low-weight dth-order correlation-immune boolean functions. Cryptology ePrint Archive, Report 2013/303, 2013. http://eprint.iacr.org/. Maxime Nassar, Sylvain Guilley, and Jean-Luc Danger. Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks. In Daniel J. Bernstein and Sanjit Chatterjee, editors, INDOCRYPT, volume 7107 of LNCS, pages 22–39. Springer, 2011. Emmanuel Prouff and Matthieu Rivain. A generic method for secure SBox implementation.

slide-68
SLIDE 68

UCL Crypto Group

UCL/ICTEAM/ELEN

Leakage Squeezing

26 / 26

In Sehun Kim, Moti Yung, and Hyung-Woo Lee, editors, WISA, volume 4867 of LNCS, pages 227–244. Springer, 2007.