Threshold implementations of small S-boxes
From MaRDI portal
Publication:892276
DOI10.1007/S12095-014-0104-7zbMATH Open1365.94403OpenAlexW2166531223MaRDI QIDQ892276FDOQ892276
Svetla Nikova, Vincent Rijmen, Natalia Tokareva, Ventzislav Nikov, Valeriya Vitkup, Begül Bilgin
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2475.pdf
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Keccak
- Codes, bent functions and permutations suitable for DES-like cryptosystems
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- PRINTcipher: A Block Cipher for IC-Printing
- On the Classification of 4 Bit S-Boxes
- On the classification of APN functions up to dimension five
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- Selected Areas in Cryptography
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Power Analysis Attacks
- Provably Secure Higher-Order Masking of AES
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Advanced Encryption Standard – AES
- Side-channel resistant crypto for less than 2,300 GE
- The Round Functions of RIJNDAEL Generate the Alternating Group
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- Higher Order Masking of Look-Up Tables
- Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
- Statistical Tools Flavor Side-Channel Collision Attacks
- Correlation-Enhanced Power Analysis Collision Attack
- A new approach to block cipher design
- A More Efficient AES Threshold Implementation
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Cited In (14)
- Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes
- FROM CRYPTANALYSIS TO CRYPTOGRAPHIC PROPERTY OF A BOOLEAN FUNCTION
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
- Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials
- Decomposition of permutations in a finite field
- Protecting Triple-DES Against DPA
- Threshold Implementation in Software
- Algebraic Decomposition for Probing Security
- Affine Equivalence and Its Application to Tightening Threshold Implementations
- Consolidating Masking Schemes
- SILVER -- statistical independence and leakage verification
- Uniform first-order threshold implementations
- Side-Channel Analysis Protection and Low-Latency in Action
- On derivatives of polynomials over finite fields through integration
Uses Software
This page was built for publication: Threshold implementations of small S-boxes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892276)