Paper 2025/035
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience
Abstract
Unprotected cryptographic implementations are vulnerable to implementation attacks, such as passive side-channel attacks and active fault injection attacks. Recently, countermeasures like polynomial masking and duplicated masking have been introduced to protect implementations against combined attacks that exploit leakage and faults simultaneously.
While duplicated masking requires
Note: This is the full version.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- A minor revision of an IACR publication in TCHES 2025
- Keywords
- Polynomial MaskingParallel ComputationPacked Secret SharingLeakage and Fault ResilienceCombined Attacks
- Contact author(s)
-
sebastian faust @ tu-darmstadt de
maximilian orlt @ tu-darmstadt de
kathrin wirschem @ tu-darmstadt de
liang zhao @ tu-darmstadt de - History
- 2025-01-09: revised
- 2025-01-09: received
- See all versions
- Short URL
- https://ia.cr/2025/035
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/035, author = {Sebastian Faust and Maximilian Orlt and Kathrin Wirschem and Liang Zhao}, title = {All-You-Can-Compute: Packed Secret Sharing for Combined Resilience}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/035}, year = {2025}, url = {https://eprint.iacr.org/2025/035} }