From Random Probing to Noisy Leakages Without Field-Size Dependence
Gianluca Brian, Stefan Dziembowski, and Sebastian Faust
Side channel attacks are devastating attacks targeting cryptographic implementations.
To protect against these attacks, various countermeasures have been proposed -- in particular, the so-called masking scheme.
Masking schemes work by hiding sensitive information via secret sharing all intermediate values that occur during the evaluation of a cryptographic implementation.
Over the last decade, there has been broad interest in designing and formally analyzing such schemes.
The random probing model considers leakage where the value on each wire leaks with some probability
BibTeX Citation
@inproceedings{BrDzFa24, author = {Gianluca Brian and Stefan Dziembowski and Sebastian Faust}, title = {From Random Probing to Noisy Leakages Without Field-Size Dependence}, booktitle = {Eurocrypt}, year = {2024}, month = {5}, }