Affine equivalence and its application to tightening threshold implementations
From MaRDI portal
Publication:2807212
Recommendations
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Higher-Order Threshold Implementations
- Affine Masking against Higher-Order Side Channel Analysis
- Uniform first-order threshold implementations
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
Cites work
- scientific article; zbMATH DE number 2009947 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A more efficient AES threshold implementation
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Higher-Order Threshold Implementations
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- PRESENT: An Ultra-Lightweight Block Cipher
- Power Analysis Attacks
- Pushing the limits: a very compact and a threshold implementation of AES
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes
- Threshold implementations of small S-boxes
- Towards sound approaches to counteract power-analysis attacks
Cited in
(6)- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Energy consumption of protected cryptographic hardware cores. An experimental study
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementation in software. Case study of PRESENT
This page was built for publication: Affine equivalence and its application to tightening threshold implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807212)