Projects per year
correlation between the power consumption of a cryptographic device
and intermediate values within the computation. Randomization via
(Boolean) masking of intermediate values breaks this statistical dependence
and thus prevents such attacks (at least up to a certain order). Especially
for software implementations, (first-order) masking schemes are
popular in academia and industry, albeit typically not as the sole countermeasure.
The current practice then is to manually ‘insert’ Boolean
masks: essentially software developers need to manipulate low-level assembly
language to implement masking. In this paper we make a first
step to automate this process, at least for first-order Boolean masking,
allowing the development of compilers capable of protecting programs
FingerprintDive into the research topics of 'Compiler assisted masking'. Together they form a unique fingerprint.
- 2 Finished
Oswald, M. E.
1/01/11 → 1/04/16
1/10/09 → 1/04/14