Threshold Implementations Against Side-Channel Attacks and Glitches
From MaRDI portal
Publication:3535346
DOI10.1007/11935308_38zbMath1239.94058OpenAlexW1873852107MaRDI QIDQ3535346
Svetla Nikova, Vincent Rijmen, Christian Rechberger
Publication date: 11 November 2008
Published in: Information and Communications Security (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/234260
Related Items (48)
Very Compact Hardware Implementations of the Blockcipher CLEFIA ⋮ Resilient uniformity: applying resiliency in masking ⋮ Correlation power analysis and higher-order masking implementation of WAGE ⋮ Constructions of S-boxes with uniform sharing ⋮ First full-fledged side channel attack on HMAC-SHA-2 ⋮ Consolidating Masking Schemes ⋮ The wonderful world of global random oracles ⋮ Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes ⋮ Complementing Feistel Ciphers ⋮ Higher-Order Glitch Resistant Implementation of the PRESENT S-Box ⋮ Threshold implementations of small S-boxes ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ Secret can be public: low-memory AEAD mode for high-order masking ⋮ Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext ⋮ Higher-order masking scheme for Trivium hardware implementation ⋮ RAMus- a new lightweight block cipher for RAM encryption ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Secure and efficient software masking on superscalar pipelined processors ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks ⋮ Analyzing masked ciphers against transition and coupling effects ⋮ Improving first-order threshold implementations of \textsf{SKINNY} ⋮ On decompositions of permutation polynomials into quadratic and cubic power permutations ⋮ Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks ⋮ Physical attacks and beyond ⋮ Hold your breath, PRIMATEs are lightweight ⋮ Unifying freedom and separation for tight probing-secure composition ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order ⋮ Hiding Higher-Order Side-Channel Leakage ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ Reducing Randomness Complexity of Mask Refreshing Algorithm ⋮ Protecting Triple-DES Against DPA ⋮ A First-Order SCA Resistant AES Without Fresh Randomness ⋮ FROM CRYPTANALYSIS TO CRYPTOGRAPHIC PROPERTY OF A BOOLEAN FUNCTION ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Arithmetic Addition over Boolean Masking ⋮ Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches ⋮ On the EA-classes of known APN functions in small dimensions ⋮ Masking Large Keys in Hardware: A Masked Implementation of McEliece ⋮ Fault template attacks on block ciphers exploiting fault propagation ⋮ Leakage resilient value comparison with application to message authentication ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
This page was built for publication: Threshold Implementations Against Side-Channel Attacks and Glitches