Differential fault analysis of AES: towards reaching its limits, J. Cryptographic Engineering, vol.3, issue.2, pp.73-97, 2013. ,
Inner Product Masking Revisited, Advances in Cryptology -EURO-CRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.486-510, 2015. ,
Consolidating Inner Product Masking, Advances in Cryptology -ASIACRYPT 2017 -23rd International Conference on the Theory and Applications of Cryptology and Information Security, vol.10624, pp.724-754, 2017. ,
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler, IACR Cryptology ePrint Archive, p.506, 2015. ,
Orthogonal Direct Sum Masking -A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks, Information Security Theory and Practice. Securing the Internet of Things -8th IFIP WG 11.2 International Workshop, vol.8501, pp.40-56, 2014. ,
Construction of some codes suitable for both side channel and fault injection attacks, Arithmetic of Finite Fields -7th International Workshop, WAIFI 2018, vol.11321, pp.95-107, 2018. ,
A combined power and fault analysis attack on protected grain family of stream ciphers, IEEE Trans. on CAD of Integrated Circuits and Systems, vol.36, issue.12, pp.1968-1977, 2017. ,
, Detecting Faults in Inner Product Masking Scheme -IPM-FD: IPM with Fault Detection, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02915673
Detecting Faults in Inner Product Masking Scheme -IPM-FD: IPM with Fault Detection, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02915673
Claude Carlet, and Sihem Mesnager. Optimal Linear Codes for IPM, 2020. ,
Passive and Active Combined Attacks on AES, FDTC, pp.10-18, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-02486972
HTable countermeasure against sidechannel attacks -reference implementation for the masking scheme presented in, vol.13 ,
Higher Order Masking of Look-Up Tables, Lecture Notes in Computer Science, vol.8441, pp.441-458, 2014. ,
Side Channel Cryptanalysis of a Higher Order Masking Scheme, LNCS, vol.4727, pp.28-44, 2007. ,
Physical Security Versus Masking Schemes, pp.269-284, 2018. ,
The Sodium cryptography library, 2019. ,
Private Circuits: Securing Hardware against Probing Attacks, CRYPTO, vol.2729, pp.463-481, 2003. ,
Robust error detection in communication and computation channels, Proceedings of Int. Workshop on Spectral Techniques, 2007. ,
Optimal codes for minimax criterion on error detection, IEEE Trans. Inf. Theory, vol.35, issue.6, pp.1299-1305, 1989. ,
New class of nonlinear systematic error detecting codes, IEEE Trans. Inf. Theory, vol.50, issue.8, pp.1818-1820, 2004. ,
Evaluation of a DPA-Resistant Prototype Chip, ACSAC, pp.7-11, 2009. ,
The Theory of Error-Correcting Codes, 1977. ,
The theory of error correcting codes. North-Holland mathematical library, 1977. ,
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Securing the AES finalists against power analysis attacks, Fast Software Encryption, 7th International Workshop, pp.150-164, 1978. ,
Low power secure AES S-box using adiabatic logic circuit, 2013 IEEE Faible Tension Faible Consommation, pp.1-4, 2013. ,
Balanced Self-Checking Asynchronous Logic for Smart Card Applications, Journal of Microprocessors and Microsystems, vol.27, issue.9, pp.421-430, 2003. ,
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses, IEEE International Symposium on Hardware Oriented Security and Trust, pp.82-87, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01240228
A biased fault attack on the time redundancy countermeasure for AES, Constructive Side-Channel Analysis and Secure Design -6th International Workshop, vol.9064, pp.189-203, 2015. ,
Connecting and Improving Direct Sum Masking and Inner Product Masking, Smart Card Research and Advanced Applications -16th International Conference, vol.10728, pp.123-141, 2017. ,
Provably Secure Higher-Order Masking of AES, LNCS, vol.6225, pp.413-427, 2010. ,
Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, pp.15-22, 2018. ,
Partitowards combined hardware countermeasures against sidechannel and fault-injection attacks, Advances in Cryptology -CRYPTO 2016 -36th Annual International Cryptology Conference, vol.9815, pp.302-332, 2016. ,
University of Sydney (Australia). Magma Computational Algebra System, IEEE Trans. Information Theory, vol.10, issue.2, pp.2014-2022, 1964. ,
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages, Smart Card Research and Advanced Applications -15th International Conference, vol.10146, pp.174-191, 2016. ,