Arithmetic Addition over Boolean Masking
From MaRDI portal
Recommendations
- Efficient conversion method from arithmetic to Boolean masking in constrained devices
- scientific article; zbMATH DE number 2081107
- Algorithms for Switching between Boolean and Arithmetic Masking of Second Order
- High-order conversion from Boolean to arithmetic masking
- scientific article; zbMATH DE number 1759296
- Conversion from arithmetic to Boolean masking with logarithmic complexity
- scientific article; zbMATH DE number 3873237
Cites work
- scientific article; zbMATH DE number 1455096 (Why is no real title available?)
- scientific article; zbMATH DE number 1878319 (Why is no real title available?)
- A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations
- A more efficient AES threshold implementation
- Addition with blinded operands
- Conversion from arithmetic to Boolean masking with logarithmic complexity
- Correlation-enhanced power analysis collision attack
- Efficient and provably secure methods for switching from arithmetic to Boolean masking
- Higher-Order Threshold Implementations
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- On the simplicity of converting leakages from multivariate to univariate. (Case study of a glitch-resistant masking scheme)
- Power Analysis Attacks
- Pushing the limits: a very compact and a threshold implementation of AES
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Secure conversion between Boolean and arithmetic masking of any order
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel analysis of six SHA-3 candidates
- Side-channel resistant crypto for less than 2,300 GE
- Techniques for Random Masking in Hardware
- The Stream Cipher HC-128
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes
Cited in
(5)- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- A holistic approach towards side-channel secure fixed-weight polynomial sampling
- Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware
- Masking large keys in hardware: a masked implementation of McEliece
- Formal verification of arithmetic masking in hardware and software
This page was built for publication: Arithmetic Addition over Boolean Masking
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2794517)