@inproceedings{99edc82349ec4efe9a3372871aefb951,
title = "Masks will fall off higher-order optimal distinguishers",
abstract = "Higher-order side-channel attacks are able to break the security of cryptographic implementations even if they are protected with masking countermeasures. In this paper, we derive the best possible distinguishers (High-Order Optimal Distinguishers or HOOD) against masking schemes under the assumption that the attacker can profile. Our exact derivation admits simple approximate expressions for high and low noise and shows to which extent the optimal distinguishers reduce to known attacks in the case where no profiling is possible. From these results, we can explain theoretically the empirical outcome of recent works on second-order distinguishers. In addition, we extend our analysis to any order and to the application to masked tables precomputation. Our results give some insight on which distinguishers have to be considered in the security analysis of cryptographic devices.",
keywords = "Higher-order masking, Higher-order optimal distinguisher (HOOD), Masking tables, Side-channel analysis, Template attack",
author = "Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul",
note = "Publisher Copyright: {\textcopyright} International Association for Cryptologic Research 2014.; 20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014 ; Conference date: 07-12-2014 Through 11-12-2014",
year = "2014",
month = jan,
day = "1",
doi = "10.1007/978-3-662-45608-8\_19",
language = "English",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "344--365",
editor = "Palash Sarkar and Tetsu Iwata",
booktitle = "Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II",
}