Higher-Order Threshold Implementations
From MaRDI portal
Publication:2936616
DOI10.1007/978-3-662-45608-8_18zbMATH Open1317.94086OpenAlexW1567394420MaRDI QIDQ2936616FDOQ2936616
Authors: Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Publication date: 6 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2474.pdf
Recommendations
- Uniform first-order threshold implementations
- About complexity of implementing threshold functions
- Improved approximation of linear threshold functions
- On dynamic threshold schemes
- Threshold functions
- scientific article; zbMATH DE number 3912274
- Revising threshold functions
- scientific article; zbMATH DE number 3988712
- Parallel computation with threshold functions
- Improving first-order threshold implementations of \textsf{SKINNY}
Cited In (33)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks
- Higher-order glitches free implementation of the AES using secure multi-party computation protocols
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
- Affine equivalence and its application to tightening threshold implementations
- Resilient uniformity: applying resiliency in masking
- How fast can higher-order masking be in software?
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Arithmetic Addition over Boolean Masking
- Threshold Implementations Against Side-Channel Attacks and Glitches
- A low-randomness second-order masked AES
- Detecting flawed masking schemes with leakage detection tests
- Threshold implementations with non-uniform inputs
- CAPABARA: a combined attack on CAPA
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- Towards sound fresh re-keying with hard (physical) learning problems
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Energy consumption of protected cryptographic hardware cores. An experimental study
- Secret can be public: low-memory AEAD mode for high-order masking
- Side-channel attacks on threshold implementations using a glitch algebra
- A more efficient AES threshold implementation
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Uniform first-order threshold implementations
- Cryptanalysis of masked ciphers: a not so random idea
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- Masking large keys in hardware: a masked implementation of McEliece
- Improving first-order threshold implementations of \textsf{SKINNY}
- Threshold counters with increments and decrements
- Reducing randomness complexity of mask refreshing algorithm
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementation in software. Case study of PRESENT
This page was built for publication: Higher-Order Threshold Implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2936616)