Threshold implementations of small S-boxes
From MaRDI portal
Publication:892276
DOI10.1007/S12095-014-0104-7zbMATH Open1365.94403OpenAlexW2166531223MaRDI QIDQ892276FDOQ892276
Authors: Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Valeriya Vitkup, Natalia Tokareva
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2475.pdf
Recommendations
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes
- Several masked implementations of the Boyar-Peralta AES S-box
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Uniform first-order threshold implementations
Cites Work
- Keccak
- Vectorial Boolean functions for cryptography
- Codes, bent functions and permutations suitable for DES-like cryptosystems
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- PRINTcipher: A Block Cipher for IC-Printing
- On the Classification of 4 Bit S-Boxes
- On the classification of APN functions up to dimension five
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- Selected Areas in Cryptography
- Mutual information analysis: a comprehensive study
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Title not available (Why is that?)
- Power Analysis Attacks
- Provably secure higher-order masking of AES
- Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Advanced Encryption Standard – AES
- Side-channel resistant crypto for less than 2,300 GE
- The Round Functions of RIJNDAEL Generate the Alternating Group
- Pushing the limits: a very compact and a threshold implementation of AES
- Title not available (Why is that?)
- Higher order masking of look-up tables
- FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
- Statistical tools flavor side-channel collision attacks
- Correlation-enhanced power analysis collision attack
- A new approach to block cipher design
- A more efficient AES threshold implementation
- Unifying leakage models: from probing attacks to noisy leakage.
Cited In (22)
- Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes
- Algebraic decomposition for probing security
- Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes
- Lightweight authenticated encryption mode suitable for threshold implementation
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Several masked implementations of the Boyar-Peralta AES S-box
- Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials
- Decomposition of permutations in a finite field
- Affine equivalence and its application to tightening threshold implementations
- Consolidating masking schemes
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- From cryptanalysis to cryptographic property of a Boolean function
- From substitution box to threshold
- Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing
- Constructions of S-boxes with uniform sharing
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- SILVER -- statistical independence and leakage verification
- Uniform first-order threshold implementations
- Enabling 3-share threshold implementations for all 4-bit S-boxes
- On derivatives of polynomials over finite fields through integration
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementation in software. Case study of PRESENT
Uses Software
This page was built for publication: Threshold implementations of small S-boxes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892276)