Publicaties
Gekozen filters:
Gekozen filters:
Higher-Order Masked Saber KU Leuven
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces KU Leuven
Locating a cryptographic operation in a side-channel trace, i.e. finding out where it is in the time domain, without having a template, can be a tedious task even for unprotected implementations. The sheer amount of data can be overwhelming. In a simple call to OpenSSL for AES-128 ECB encryption of a single data block, only 0.00028% of the trace relate to the actual AES-128 encryption. The rest is overhead. We introduce the (to our best ...
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography KU Leuven
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research effort, a cost analysis of efficient side-channel countermeasures is still lacking. In this work, we propose a masked HW/SW codesign of the NIST PQC finalists Kyber and Saber, suitable for their ...
A Study on Output Bit Tampering of True Random Number Generators Using Time-Varying EM Waves KU Leuven
True random number generators (TRNGs) based on ring oscillators are employed in many devices because they can be constructed with logic gates only. If the randomness is degraded by the attack, it may affect the security of the cryptographic protocol. As a physical attack against TRNG, several attack methods that reduce its randomness have been proposed. On the other hand, TRNG is recommended to implement an online health test to guarantee the ...
Analysis and Comparison of Table-based Arithmetic to Boolean Masking KU Leuven
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking. Some masked implementations require conversion between these two variants, which is increasingly the case for masking of post-quantum encryption and signature schemes. One way to perform Arithmetic to Boolean (A2B) mask conversion is a table-based approach first introduced by ...