A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
From MaRDI portal
Publication:2958149
DOI10.1007/978-3-662-53887-6_30zbMath1404.94049OpenAlexW2551445677MaRDI QIDQ2958149
Cong Chen, Thomas Eisenbarth, Unnamed Author
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_30
Related Items (2)
Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
Uses Software
Cites Work
- Side-channel resistant crypto for less than 2,300 GE
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- A masked ring-LWE implementation
- Masking AES with \(d+1\) shares in hardware
- Higher-Order Threshold Implementations
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- Consolidating Masking Schemes
- A Very Compact S-Box for AES
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- PRESENT: An Ultra-Lightweight Block Cipher
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Towards sound approaches to counteract power-analysis attacks
- A More Efficient AES Threshold Implementation
- Cryptographic Hardware and Embedded Systems - CHES 2004
This page was built for publication: A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not