3,399 research outputs found
Boolean Exponent Splitting
A typical countermeasure against side-channel attacks consists of masking intermediate values with a random number. In symmetric cryptographic algorithms, Boolean shares of the secret are typically used, whereas in asymmetric algorithms the secret exponent/scalar is typically masked using algebraic properties. This paper presents a new exponent splitting technique with minimal impact on performance based on Boolean shares. More precisely, it is shown how an exponent can be efficiently split into two shares, where the exponent is the XOR sum of the two shares, typically requiring only an extra register and a few register copies per bit. Our novel exponentiation and scalar multiplication algorithms can be randomized for every execution and combined with other blinding techniques. In this way, both the exponent and the intermediate values can be protected against various types of side-channel attacks. We perform a security evaluation of our algorithms using the mutual information framework and provide proofs that they are secure against first-order side-channel attacks. The side-channel resistance of the proposed algorithms is also practically verified with test vector leakage assessment performed on Xilinx\u27s Zynq zc702 evaluation board
Monotone Projection Lower Bounds from Extended Formulation Lower Bounds
In this short note, we reduce lower bounds on monotone projections of
polynomials to lower bounds on extended formulations of polytopes. Applying our
reduction to the seminal extended formulation lower bounds of Fiorini, Massar,
Pokutta, Tiwari, & de Wolf (STOC 2012; J. ACM, 2015) and Rothvoss (STOC 2014;
J. ACM, 2017), we obtain the following interesting consequences.
1. The Hamiltonian Cycle polynomial is not a monotone subexponential-size
projection of the permanent; this both rules out a natural attempt at a
monotone lower bound on the Boolean permanent, and shows that the permanent is
not complete for non-negative polynomials in VNP under monotone
p-projections.
2. The cut polynomials and the perfect matching polynomial (or "unsigned
Pfaffian") are not monotone p-projections of the permanent. The latter, over
the Boolean and-or semi-ring, rules out monotone reductions in one of the
natural approaches to reducing perfect matchings in general graphs to perfect
matchings in bipartite graphs.
As the permanent is universal for monotone formulas, these results also imply
exponential lower bounds on the monotone formula size and monotone circuit size
of these polynomials.Comment: Published in Theory of Computing, Volume 13 (2017), Article 18;
Received: November 10, 2015, Revised: July 27, 2016, Published: December 22,
201
- …