ICICS 2006, Date: 2006/12/04 - 2006/12/07, Location: NC, Raleigh
Lecture Notes in Computer Science
Author:
Keywords:
cosic, Science & Technology, Technology, Computer Science, Theory & Methods, Computer Science, masking, secret sharing, side-channel attacks, POWER, HARDWARE, MASKING
Abstract:
© Springer-Verlag Berlin Heidelberg 2006. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Masking techniques are employed to counter side-channel attacks that are based on multiple measurements of the same operation on different data. Most currently known techniques require new random values after every nonlinear operation and they are not effective in the presence of glitches. We present a new method to protect implementations. Our method has a higher computational complexity, but requires random values only at the start, and stays effective in the presence of glitches.