Affine Equivalence and Its Application to Tightening Threshold Implementations
From MaRDI portal
Publication:2807212
DOI10.1007/978-3-319-31301-6_16zbMath1396.94098OpenAlexW2403805114MaRDI QIDQ2807212
Pascal Sasdrich, Tim Güneysu, Amir Moradi
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_16
Related Items (5)
Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ Hiding Higher-Order Side-Channel Leakage ⋮ Protecting Triple-DES Against DPA ⋮ Threshold Implementation in Software ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- Threshold implementations of small S-boxes
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- Higher-Order Threshold Implementations
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- PRESENT: An Ultra-Lightweight Block Cipher
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
- Towards sound approaches to counteract power-analysis attacks
- A More Efficient AES Threshold Implementation
- Power Analysis Attacks
This page was built for publication: Affine Equivalence and Its Application to Tightening Threshold Implementations