Pottier, Juliette Mendez Real, Maria Le Gal, Bertrand Pillement, Sébastien
Processor performance optimizations such as Out-of-Order or speculative execution are known to be exploited byattackers for malicious purposes. Numerous side-channel attackshave been developed over decades and more recently transientattacks are considered serious threats. As a countermeasure,previous works offered detection methods monitoring hardw...
Belleville, Nicolas Masure, Loïc
Combining countermeasures against side-channel attacks represents a promising approach to defend against powerful attackers. Existing works on this topic show that the hope for a significant increase of security is sometimes fulfilled, although not always. In this paper, we consider the combination of two hiding countermeasures, namely loop shuffli...
Kundu, Suparna; 136507; Karmakar, Angshuman; 98676; Verbauwhede, Ingrid; 18159;
status: published
Casalino, Lorenzo Belleville, Nicolas Couroussé, Damien Heydemann, Karine
Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects(e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the execution performances. Several studies show that such techniques induce recombination effects. ...
Carrera Rodriguez, Rafael Bruguier, Florent Valea, Emanuele Benoit, Pascal
System on chip - Systèmes embarqués et objets connectés / International audience
Simões, Mateus Bossuet, Lilian Bruneau, Nicolas Grosso, Vincent Haddad, Patrick Sarno, Thomas
Masking is the main countermeasure against side-channel attacks due to its sound formal proof of security and the scalability of its protection parameters. However, effective masking increases the implementation complexity by requiring additional silicon area, random number generators and higher latency. Thus, reducing the masking implementation co...
Cassiers, Gaëtan Masure, Loïc Momin, Charles Moos, Thorben Standaert, François-Xavier
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking. Indeed, it is a common observation that the desired security amplification of Boolean masking collapses when the noise level in the measurements is too low. Arithmetic encodings in prime fi...
Gaine, Clément Nikolovski, Jean-Pierre Aboulkassimi, Driss Dutertre, Jean-Max
Electronic components may contain sensitive data, either on the storage chip or on the microprocessor. Deliberate and precise perturbation of their operation or measurement of their activity through auxiliary channels can be used to extract the secrets they contain. For these reasons, it is important that the integrity of the integrated circuit is ...
D'Anvers, Jan-Pieter; 105350; Van Beirendonck, Michiel; 131919; Verbauwhede, Ingrid; 18159;
status: published
Berzati, Alexandre Calle Viera, Andersson Chartouny, Maya Madec, Steven Vergnaud, Damien Vigilant, David
This paper presents a new profiling side-channel attack on CRYSTALS-Dilithium, the new NIST primary standard for quantum-safe digital signatures. An open-source implementation of CRYSTALS-Dilithium is already available, with constant-time property as a consideration for side-channel resilience. However, this implementation does not protect against ...