Side-channel resistant crypto for less than 2,300 GE
From MaRDI portal
Publication:656520
DOI10.1007/S00145-010-9086-6zbMATH Open1239.94063OpenAlexW2128197017MaRDI QIDQ656520FDOQ656520
Authors: Axel Poschmann, Amir Moradi, Khoongming Khoo, C. W. Lim, Huaxiong Wang, San Ling
Publication date: 18 January 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/10220/7712
Recommendations
Cites Work
- Vectorial Boolean functions for cryptography
- How to share a secret
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Authenticating Pervasive Devices with Human Protocols
- DPA Leakage Models for CMOS Logic Circuits
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Fast Software Encryption
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Power Analysis Attacks
- Towards sound approaches to counteract power-analysis attacks
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- New Lightweight DES Variants
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
- Title not available (Why is that?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Applied Cryptography and Network Security
Cited In (37)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Threshold implementations of small S-boxes
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Side channel analysis of SPARX-64/128: cryptanalysis and countermeasures
- Algebraic decomposition for probing security
- Lightweight authenticated encryption mode suitable for threshold implementation
- Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials
- Decomposition of permutations in a finite field
- Affine equivalence and its application to tightening threshold implementations
- Consolidating masking schemes
- How fast can higher-order masking be in software?
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
- Arithmetic Addition over Boolean Masking
- From substitution box to threshold
- DRECON: DPA resistant encryption by construction
- Fault template attacks on block ciphers exploiting fault propagation
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Advanced Encryption Standard – AES
- FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
- SILVER -- statistical independence and leakage verification
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
- Uniform first-order threshold implementations
- Learn from your faults: leakage assessment in fault attacks using deep learning
- Fresh re-keying: security against side-channel and fault attacks for low-cost devices
- Complementing Feistel ciphers
- Succinct Diophantine-satisfiability arguments
- Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- On the security of RSM -- presenting 5 first -- and second-order attacks
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik
- Improving first-order threshold implementations of \textsf{SKINNY}
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementation in software. Case study of PRESENT
Uses Software
This page was built for publication: Side-channel resistant crypto for less than 2,300 GE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q656520)