Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
Keywords:Masking, Micro-architectures, Side-channel Analysis, Probing Security
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the literature. The resulting notions, which are based on the placement of shares, are applied to a two-share randomness-free PRESENT cipher and Keccak-f. The assembly implementations are put on a RISC-V and an ARM Cortex-M4 core. All designs are validated in the glitch and transition extended probing model and their implementations via practical lab analysis.
How to Cite
Copyright (c) 2023 John Gaspoz, Siemen Dhooghe
This work is licensed under a Creative Commons Attribution 4.0 International License.