Side-channel resistant crypto for less than 2,300 GE

From MaRDI portal
Publication:656520


DOI10.1007/s00145-010-9086-6zbMath1239.94063MaRDI QIDQ656520

Huaxiong Wang, San Ling, Axel Poschmann, Amir Moradi, Chu-Wee Lim, Khoongming Khoo

Publication date: 18 January 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/10220/7712


94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, How Fast Can Higher-Order Masking Be in Software?, Secure hardware implementation of nonlinear functions in the presence of glitches, WARP: revisiting GFN for lightweight 128-bit block cipher, Threshold implementations of small S-boxes, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Uniform first-order threshold implementations, Fault template attacks on block ciphers exploiting fault propagation, Lightweight authenticated encryption mode suitable for threshold implementation, Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials, Decomposition of permutations in a finite field, Arithmetic Addition over Boolean Masking, On the Security of RSM - Presenting 5 First- and Second-Order Attacks, Affine Equivalence and Its Application to Tightening Threshold Implementations, ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks, Complementing Feistel Ciphers, Side-Channel Analysis Protection and Low-Latency in Action, A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not, Hiding Higher-Order Side-Channel Leakage, Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes, On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis, Protecting Triple-DES Against DPA, Threshold Implementation in Software, Algebraic Decomposition for Probing Security, Consolidating Masking Schemes


Uses Software


Cites Work