You are looking at a specific version 20170509:172712 of this paper. See the latest version.

Paper 2017/399

Practical Evaluation of Masking Software Countermeasures on an IoT processor

David McCann and Elisabeth Oswald

Abstract

Implementing cryptography on Internet-of-Things (IoT) devices, that is resilient against side channel analysis, has so far been a task only suitable for specialist software designers in interaction with access to a sophisticated testing facility. Recently a novel tool has been developed, ELMO, which offers the potential to enable non-specialist software developers to evaluate their code w.r.t. power analysis for a popular IoT processor. We explain a crucial extension of ELMO, which enables a user to test higher-order masking schemes much more efficiently than so far possible as well as improve the ease and speed of diagnosing masking errors.

Note: Resubmitted following email exchange with Tancrede Lepoint to clarify publication status.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
IoTmaskingside channel attacks
Contact author(s)
david mccann @ bristol ac uk
History
2017-05-09: received
Short URL
https://ia.cr/2017/399
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.