Secure hardware implementation of nonlinear functions in the presence of glitches
From MaRDI portal
Publication:656517
DOI10.1007/S00145-010-9085-7zbMATH Open1239.94060OpenAlexW2114286085WikidataQ22022529 ScholiaQ22022529MaRDI QIDQ656517FDOQ656517
Authors: Svetla Nikova, Vincent Rijmen, Martin Schläffer
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9085-7
Recommendations
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Threshold Implementations Against Side-Channel Attacks and Glitches
- On the simplicity of converting leakages from multivariate to univariate. (Case study of a glitch-resistant masking scheme)
- Formal verification of masked hardware implementations in the presence of glitches
- Higher-order glitches free implementation of the AES using secure multi-party computation protocols
Cites Work
- How to share a secret
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- A Very Compact S-Box for AES
- Advances in Cryptology - CRYPTO 2003
- DPA Leakage Models for CMOS Logic Circuits
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- Selected Areas in Cryptography
- The world is not enough: another look on second-order DPA
- Power Analysis Attacks
- Topics in Cryptology – CT-RSA 2006
- Mutual Information Analysis: How, When and Why?
- Towards sound approaches to counteract power-analysis attacks
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Fast Software Encryption
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Advanced Encryption Standard – AES
- Topics in Cryptology – CT-RSA 2005
- Side-channel resistant crypto for less than 2,300 GE
Cited In (52)
- Threshold implementations of small S-boxes
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- A methodology for the characterisation of leakages in combinatorial logic
- Algebraic decomposition for probing security
- Boosting higher-order correlation attacks by dimensionality reduction
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Affine equivalence and its application to tightening threshold implementations
- Resilient uniformity: applying resiliency in masking
- How fast can higher-order masking be in software?
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Arithmetic Addition over Boolean Masking
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers
- Codes for side-channel attacks and protections
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Higher-order glitch resistant implementation of the PRESENT S-box
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
- Formal verification of masked hardware implementations in the presence of glitches
- Universal hashing based on field multiplication and (near-)MDS matrices
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking
- From substitution box to threshold
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- A first-order SCA resistant AES without fresh randomness
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- Constructions of S-boxes with uniform sharing
- Leakage resilient value comparison with application to message authentication
- Towards sound fresh re-keying with hard (physical) learning problems
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Handcrafting: improving automated masking in hardware with manual optimizations
- Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking
- Towards tight random probing security
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- Accelerating SLH-DSA by two orders of magnitude with a single hash unit
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- SILVER -- statistical independence and leakage verification
- A small GIFT-COFB: lightweight bit-serial architectures
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Uniform first-order threshold implementations
- AES side-channel countermeasure using random tower field constructions
- Spin me right round rotational symmetry for FPGA-specific AES: extended version
- Complementing Feistel ciphers
- Succinct Diophantine-satisfiability arguments
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- Redefining the transparency order
- Improving first-order threshold implementations of \textsf{SKINNY}
- Threshold implementation in software. Case study of PRESENT
- On the simplicity of converting leakages from multivariate to univariate. (Case study of a glitch-resistant masking scheme)
Uses Software
This page was built for publication: Secure hardware implementation of nonlinear functions in the presence of glitches
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q656517)