Welcome to the resource topic for 2013/735
Title:
Masking Tables—An Underestimated Security Risk
Authors: Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
Abstract:The literature on side-channel analysis describes numerous masking schemes designed to protect block ciphers at the implementation level. Such masking schemes typically require the computation of masked tables prior to the execution of an encryption function. In this paper we revisit an attack which directly exploits this computation in such a way as to recover all or some of the masks used. We show that securely implementing masking schemes is only possible where one has access to a significant amount of random numbers.
ePrint: https://eprint.iacr.org/2013/735
Talk: https://www.youtube.com/watch?v=2JEiLIUSCRE
Slides: https://iacr.org/cryptodb/archive/2013/FSE/presentation/25069.pdf
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .