[Resource Topic] 2022/1546: Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

Welcome to the resource topic for 2022/1546

Title:
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

Authors: John Gaspoz, Siemen Dhooghe

Abstract:

This paper provides necessary properties to algorithmically secure first-order maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis.

ePrint: https://eprint.iacr.org/2022/1546

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .