Threshold implementations of small S-boxes
From MaRDI portal
Publication:892276
DOI10.1007/s12095-014-0104-7zbMath1365.94403OpenAlexW2166531223MaRDI QIDQ892276
Svetla Nikova, Vincent Rijmen, Ventzislav Nikov, Valeriya Vitkup, Begül Bilgin, Natalia Tokareva
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2475.pdf
Related Items (13)
Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials ⋮ Decomposition of permutations in a finite field ⋮ Algebraic Decomposition for Probing Security ⋮ Consolidating Masking Schemes ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ Uniform first-order threshold implementations ⋮ SILVER -- statistical independence and leakage verification ⋮ Protecting Triple-DES Against DPA ⋮ Threshold Implementation in Software ⋮ FROM CRYPTANALYSIS TO CRYPTOGRAPHIC PROPERTY OF A BOOLEAN FUNCTION ⋮ On derivatives of polynomials over finite fields through integration ⋮ Affine Equivalence and Its Application to Tightening Threshold Implementations ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- On the classification of APN functions up to dimension five
- Codes, bent functions and permutations suitable for DES-like cryptosystems
- Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes
- Statistical Tools Flavor Side-Channel Collision Attacks
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- The Round Functions of RIJNDAEL Generate the Alternating Group
- Threshold Implementations Against Side-Channel Attacks and Glitches
- PRINTcipher: A Block Cipher for IC-Printing
- Correlation-Enhanced Power Analysis Collision Attack
- Provably Secure Higher-Order Masking of AES
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- A new approach to block cipher design
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
- Keccak
- A More Efficient AES Threshold Implementation
- Power Analysis Attacks
- Advanced Encryption Standard – AES
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Higher Order Masking of Look-Up Tables
- On the Classification of 4 Bit S-Boxes
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- Selected Areas in Cryptography
This page was built for publication: Threshold implementations of small S-boxes