Affine equivalence and its application to tightening threshold implementations
From MaRDI portal
Publication:2807212
DOI10.1007/978-3-319-31301-6_16zbMATH Open1396.94098OpenAlexW2403805114MaRDI QIDQ2807212FDOQ2807212
Authors: Pascal Sasdrich, Amir Moradi, Tim Güneysu
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_16
Recommendations
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Higher-Order Threshold Implementations
- Affine Masking against Higher-Order Side Channel Analysis
- Uniform first-order threshold implementations
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
Cites Work
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Secure hardware implementation of nonlinear functions in the presence of glitches
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Title not available (Why is that?)
- Power Analysis Attacks
- Towards sound approaches to counteract power-analysis attacks
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
- Threshold implementations of small S-boxes
- Side-channel resistant crypto for less than 2,300 GE
- Pushing the limits: a very compact and a threshold implementation of AES
- A More Efficient AES Threshold Implementation
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Higher-Order Threshold Implementations
Cited In (5)
Uses Software
This page was built for publication: Affine equivalence and its application to tightening threshold implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807212)