Side-channel resistant crypto for less than 2,300 GE
From MaRDI portal
Publication:656520
DOI10.1007/s00145-010-9086-6zbMath1239.94063OpenAlexW2128197017MaRDI QIDQ656520
Huaxiong Wang, San Ling, Axel Poschmann, Amir Moradi, Chu-Wee Lim, Khoongming Khoo
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/10220/7712
Related Items
Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Decomposition of permutations in a finite field ⋮ Algebraic Decomposition for Probing Security ⋮ Consolidating Masking Schemes ⋮ Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes ⋮ Complementing Feistel Ciphers ⋮ Threshold implementations of small S-boxes ⋮ Learn from your faults: leakage assessment in fault attacks using deep learning ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks ⋮ Improving first-order threshold implementations of \textsf{SKINNY} ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Uniform first-order threshold implementations ⋮ Succinct Diophantine-satisfiability arguments ⋮ SILVER -- statistical independence and leakage verification ⋮ Hiding Higher-Order Side-Channel Leakage ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis ⋮ Protecting Triple-DES Against DPA ⋮ Threshold Implementation in Software ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ Arithmetic Addition over Boolean Masking ⋮ On the Security of RSM - Presenting 5 First- and Second-Order Attacks ⋮ Affine Equivalence and Its Application to Tightening Threshold Implementations ⋮ Fault template attacks on block ciphers exploiting fault propagation ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- How to share a secret
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- DPA Leakage Models for CMOS Logic Circuits
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- New Lightweight DES Variants
- PRESENT: An Ultra-Lightweight Block Cipher
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Authenticating Pervasive Devices with Human Protocols
- Fast Software Encryption
- Applied Cryptography and Network Security