Linear Repairing Codes and Side-Channel Attacks
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to share the sensitive data. Applying the same princi...
Main Authors: | Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-02-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/835 |
Similar Items
-
Redundant Code-based Masking Revisited
by: Nicolas Costes, et al.
Published: (2020-12-01) -
Redundant Code-based Masking Revisited
by: Nicolas Costes, et al.
Published: (2020-12-01) -
Software Protection Against Fault and Side Channel Attacks
by: Patrick, Conor Persson
Published: (2017) -
Information Leakages in Code-based Masking: A Unified Quantification Approach
by: Wei Cheng, et al.
Published: (2021-07-01) -
Side Channel Information Leakage: Design and Implementation of Hardware Countermeasure
by: Khatib Zadeh, Amirali
Published: (2010)