Redundant Code-based Masking Revisited

Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising t...

Full description

Bibliographic Details
Main Authors: Nicolas Costes, Martijn Stam
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2020-12-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/8740