Leakage Resilient Masking Schemes

December 17, 2015

Sebastian Faust


Leakage Resilient Masking Schemes

Time:   11:45am
Location:   Meeting room 302 (Mountain View), level 3

Masking schemes are widely used in practice to defeat side-channel attacks, which exploit the power consumption of devices. At the same time a large body of recent theoretical works study feasibility of computation in the presence of leakage and attempts to provide a formal security analysis of the masking countermeasure. In this talk, we will review some recent advances in the formal security analysis of masking schemes and present efficient ways how to apply the masking countermeasure at smart card level.