Threshold Implementation in Software
From MaRDI portal
Publication:3297560
DOI10.1007/978-3-319-89641-0_13zbMath1450.94042OpenAlexW2798123664MaRDI QIDQ3297560
Pascal Sasdrich, Amir Moradi, René Bock
Publication date: 20 July 2020
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-89641-0_13
Uses Software
Cites Work
- Unnamed Item
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Side-channel resistant crypto for less than 2,300 GE
- Threshold implementations of small S-boxes
- Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- On the Security of RSM - Presenting 5 First- and Second-Order Attacks
- Affine Equivalence and Its Application to Tightening Threshold Implementations
- Affine Masking against Higher-Order Side Channel Analysis
- Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
- Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes
- A Very Compact “Perfectly Masked” S-Box for AES
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- PRESENT: An Ultra-Lightweight Block Cipher
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Secure Multiplicative Masking of Power Functions
- Provably Secure Higher-Order Masking of AES
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
- Higher-Order Masking Schemes for S-Boxes
- Towards sound approaches to counteract power-analysis attacks
- Minimizing S-Boxes in Hardware by Utilizing Linear Transformations
- Efficient Masked S-Boxes Processing – A Step Forward –
- Detecting Hidden Leakages
- Power Analysis Attacks
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- How Fast Can Higher-Order Masking Be in Software?
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Threshold Implementation in Software