AI, Data Science & Business Certificates from Google, IBM & Microsoft
MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about masking security models in this conference session from CHES 2025, chaired by Rei Ueno, covering advanced cryptographic protection techniques against side-channel attacks. Explore theoretical foundations and practical implementations of masking schemes used to secure cryptographic implementations. Discover how security models evaluate the effectiveness of masking countermeasures in protecting sensitive data from power analysis and electromagnetic attacks. Examine current research developments in masking methodologies and their applications in hardware and software cryptographic systems. Gain insights into the mathematical frameworks used to prove security guarantees of masked implementations and understand the trade-offs between security levels and performance overhead.
Syllabus
Masking (Security Models) (CHES 2025)
Taught by
TheIACR