Side-channel resistant crypto for less than 2,300 GE

From MaRDI portal
Revision as of 09:53, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:656520


DOI10.1007/s00145-010-9086-6zbMath1239.94063MaRDI QIDQ656520

Huaxiong Wang, San Ling, Axel Poschmann, Amir Moradi, Chu-Wee Lim, Khoongming Khoo

Publication date: 18 January 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/10220/7712


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, How Fast Can Higher-Order Masking Be in Software?, Learn from your faults: leakage assessment in fault attacks using deep learning, Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks, Improving first-order threshold implementations of \textsf{SKINNY}, Secure hardware implementation of nonlinear functions in the presence of glitches, WARP: revisiting GFN for lightweight 128-bit block cipher, Threshold implementations of small S-boxes, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Uniform first-order threshold implementations, Fault template attacks on block ciphers exploiting fault propagation, Lightweight authenticated encryption mode suitable for threshold implementation, Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials, Decomposition of permutations in a finite field, Succinct Diophantine-satisfiability arguments, SILVER -- statistical independence and leakage verification, Arithmetic Addition over Boolean Masking, On the Security of RSM - Presenting 5 First- and Second-Order Attacks, Affine Equivalence and Its Application to Tightening Threshold Implementations, ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks, Complementing Feistel Ciphers, Side-Channel Analysis Protection and Low-Latency in Action, A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not, Hiding Higher-Order Side-Channel Leakage, Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes, On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis, Protecting Triple-DES Against DPA, Threshold Implementation in Software, Algebraic Decomposition for Probing Security, Consolidating Masking Schemes


Uses Software


Cites Work