EN FR
EN FR


Section: New Results

Formalizing counter-measures for differential power analysis

Participants : Benjamin Grégoire, Gilles Barthe [IMDEA] , Sonia Belaïd [Thales Communications & Security] , François Dupressoir [IMDEA] , Sebastian Faust [Ruhr Universität Bochum] , Pierre-Alain Fouque [Université de Rennes and Institut Universitaire de France] , François-Xavier Standaert [Université Catholique de Louvain] , Pierre-Yves Strub [IMDEA] , Rébecca Zucchini [ENS Cachan and Inria] .

Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves cryptographic material by measuring and analyzing the power consumption of the device on which the cryptographic algorithm under attack executes. We introduced new notions and models allowing to check the correctness of counter measures (known as masking schemes) [8], [22]. Based on this idea we have developed a compiler to transform an unmasked program into it masked version.