CBM-TI: Code-Based Masking against Glitches by Hybridization with Threshold Implementation
| dc.contributor.author | Reefat, Hasin Ishraq | |
| dc.contributor.author | Pourmehrani, Hossein | |
| dc.contributor.author | Cheng, Wei | |
| dc.contributor.author | Carlet, Claude | |
| dc.contributor.author | Daif, Abderrahman | |
| dc.contributor.author | Tavernier, Cédric | |
| dc.contributor.author | Guilley, Sylvain | |
| dc.contributor.author | Karimi, Naghmeh | |
| dc.date.accessioned | 2025-06-17T14:45:39Z | |
| dc.date.available | 2025-06-17T14:45:39Z | |
| dc.date.issued | 2025-04 | |
| dc.description | IEEE VLSI Test Symposium 2025 Tempe, AZ, USA | |
| dc.description.abstract | Code-Based Masking (CBM) has been introduced to enhance high-order Boolean masking by increasing its resistance order via further decorrelating the coordinates of each symbol involved in the computation. Additionally, CBM enables cost amortization and fault detection. Notably, as demonstrated at CHES 2024, CBM facilitates the computation of provably masked operations under the Strong Non-Interference (SNI) security assumption with quasi-linear complexity. On the other hand, Threshold Implementation (TI) serves as an extension of Boolean masking, armoring it against combinational hazards. In this article, we show that merits of CBM and TI can be combined, paving the way to more secure hardware (high-order) masked implementations. We demonstrate CBM-TI, which is proven secure as well under SNI assumption and security when glitches worsen the leakage model. | |
| dc.description.sponsorship | This work has partly benefited from the funding by French Bank for Innovation (BPI), through the project X7PQC (project call “Cryptographie post quantique”, held by the National Quantum Strategy “Develop the post-quantum cryptographical offering” and the National Cyber Strategy “Development of innovative and critical cyber technologies” | |
| dc.format.extent | 11 pages | |
| dc.genre | conference papers and proceedings | |
| dc.genre | preprints | |
| dc.identifier | doi:10.13016/m2z9m0-shyl | |
| dc.identifier.uri | http://hdl.handle.net/11603/38926 | |
| dc.language.iso | en_US | |
| dc.publisher | IEEE | |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
| dc.relation.ispartof | UMBC Student Collection | |
| dc.relation.ispartof | UMBC Faculty Collection | |
| dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
| dc.subject | Novel masking scheme (CBMTI) | |
| dc.subject | Leakage detection by T-test | |
| dc.subject | simulations | |
| dc.subject | UMBC Cybersecurity Institute | |
| dc.subject | emulation | |
| dc.subject | Threshold Implementation (TI) | |
| dc.subject | Glitch-resistance | |
| dc.subject | Code-Based Masking (CBM) | |
| dc.subject | High-order side-channel protection | |
| dc.title | CBM-TI: Code-Based Masking against Glitches by Hybridization with Threshold Implementation | |
| dc.type | Text | |
| dcterms.creator | https://orcid.org/0009-0000-6776-2542 | |
| dcterms.creator | https://orcid.org/0000-0002-5825-6637 | |
| dcterms.creator | https://orcid.org/0009-0001-3906-6117 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- CBMTICodeBasedMaskingagainstGlitchesbyHybridizationwithThresholdImplementation.pdf
- Size:
- 1.14 MB
- Format:
- Adobe Portable Document Format
