A More Efficient AES Threshold Implementation
From MaRDI portal
Publication:4981773
DOI10.1007/978-3-319-06734-6_17zbMath1288.94053OpenAlexW1511360501MaRDI QIDQ4981773
Benedikt Gierlichs, Ventzislav Nikov, Vincent Rijmen, Begül Bilgin, Svetla Nikova
Publication date: 24 June 2014
Published in: Progress in Cryptology – AFRICACRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-06734-6_17
Related Items (16)
Consolidating Masking Schemes ⋮ Threshold implementations of small S-boxes ⋮ Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Hold your breath, PRIMATEs are lightweight ⋮ An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Arithmetic Addition over Boolean Masking ⋮ Affine Equivalence and Its Application to Tightening Threshold Implementations ⋮ Masking Large Keys in Hardware: A Masked Implementation of McEliece ⋮ Impossible Differential Cryptanalysis of Reduced-Round SKINNY ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
This page was built for publication: A More Efficient AES Threshold Implementation