Side-channel resistant crypto for less than 2,300 GE

From MaRDI portal
Publication:656520

DOI10.1007/s00145-010-9086-6zbMath1239.94063OpenAlexW2128197017MaRDI QIDQ656520

Huaxiong Wang, San Ling, Axel Poschmann, Amir Moradi, Chu-Wee Lim, Khoongming Khoo

Publication date: 18 January 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/10220/7712




Related Items

Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomialsWARP: revisiting GFN for lightweight 128-bit block cipherDecomposition of permutations in a finite fieldAlgebraic Decomposition for Probing SecurityConsolidating Masking SchemesEnabling 3-Share Threshold Implementations for all 4-Bit S-BoxesComplementing Feistel CiphersThreshold implementations of small S-boxesLearn from your faults: leakage assessment in fault attacks using deep learningSide-Channel Analysis Protection and Low-Latency in ActionA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotDivided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacksImproving first-order threshold implementations of \textsf{SKINNY}Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histogramsUniform first-order threshold implementationsSuccinct Diophantine-satisfiability argumentsSILVER -- statistical independence and leakage verificationHiding Higher-Order Side-Channel LeakageSecure hardware implementation of nonlinear functions in the presence of glitchesOn Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel AnalysisProtecting Triple-DES Against DPAThreshold Implementation in SoftwareParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelHow Fast Can Higher-Order Masking Be in Software?Arithmetic Addition over Boolean MaskingOn the Security of RSM - Presenting 5 First- and Second-Order AttacksAffine Equivalence and Its Application to Tightening Threshold ImplementationsFault template attacks on block ciphers exploiting fault propagationParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksLightweight authenticated encryption mode suitable for threshold implementation


Uses Software


Cites Work