Constructions of S-boxes with uniform sharing
From MaRDI portal
Publication:2632834
Recommendations
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Threshold implementations of small S-boxes
- Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 3882549 (Why is no real title available?)
- On the Classification of 4 Bit S-Boxes
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Strong 8-bit sboxes with efficient masking in hardware
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes
- Vectorial Boolean functions for cryptography
Cited in
(3)
This page was built for publication: Constructions of S-boxes with uniform sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2632834)