Side-channel resistant crypto for less than 2,300 GE
From MaRDI portal
Publication:656520
DOI10.1007/s00145-010-9086-6zbMath1239.94063MaRDI QIDQ656520
Huaxiong Wang, San Ling, Axel Poschmann, Amir Moradi, Chu-Wee Lim, Khoongming Khoo
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/10220/7712
Related Items
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, How Fast Can Higher-Order Masking Be in Software?, Learn from your faults: leakage assessment in fault attacks using deep learning, Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks, Improving first-order threshold implementations of \textsf{SKINNY}, Secure hardware implementation of nonlinear functions in the presence of glitches, WARP: revisiting GFN for lightweight 128-bit block cipher, Threshold implementations of small S-boxes, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Uniform first-order threshold implementations, Fault template attacks on block ciphers exploiting fault propagation, Lightweight authenticated encryption mode suitable for threshold implementation, Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials, Decomposition of permutations in a finite field, Succinct Diophantine-satisfiability arguments, SILVER -- statistical independence and leakage verification, Arithmetic Addition over Boolean Masking, On the Security of RSM - Presenting 5 First- and Second-Order Attacks, Affine Equivalence and Its Application to Tightening Threshold Implementations, ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks, Complementing Feistel Ciphers, Side-Channel Analysis Protection and Low-Latency in Action, A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not, Hiding Higher-Order Side-Channel Leakage, Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes, On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis, Protecting Triple-DES Against DPA, Threshold Implementation in Software, Algebraic Decomposition for Probing Security, Consolidating Masking Schemes
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- How to share a secret
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- DPA Leakage Models for CMOS Logic Circuits
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- New Lightweight DES Variants
- PRESENT: An Ultra-Lightweight Block Cipher
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Authenticating Pervasive Devices with Human Protocols
- Fast Software Encryption
- Applied Cryptography and Network Security