Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Threshold Implementations Against Side-Channel Attacks and Glitches - MaRDI portal

Threshold Implementations Against Side-Channel Attacks and Glitches

From MaRDI portal
Publication:3535346

DOI10.1007/11935308_38zbMath1239.94058OpenAlexW1873852107MaRDI QIDQ3535346

Svetla Nikova, Vincent Rijmen, Christian Rechberger

Publication date: 11 November 2008

Published in: Information and Communications Security (Search for Journal in Brave)

Full work available at URL: https://lirias.kuleuven.be/handle/123456789/234260




Related Items (48)

Very Compact Hardware Implementations of the Blockcipher CLEFIAResilient uniformity: applying resiliency in maskingCorrelation power analysis and higher-order masking implementation of WAGEConstructions of S-boxes with uniform sharingFirst full-fledged side channel attack on HMAC-SHA-2Consolidating Masking SchemesThe wonderful world of global random oraclesEnabling 3-Share Threshold Implementations for all 4-Bit S-BoxesComplementing Feistel CiphersHigher-Order Glitch Resistant Implementation of the PRESENT S-BoxThreshold implementations of small S-boxesSpin me right round rotational symmetry for FPGA-specific AES: extended versionEnergy consumption of protected cryptographic hardware cores. An experimental studySecret can be public: low-memory AEAD mode for high-order maskingLight but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphersA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextHigher-order masking scheme for Trivium hardware implementationRAMus- a new lightweight block cipher for RAM encryptionMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Secure and efficient software masking on superscalar pipelined processorsDivided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacksAnalyzing masked ciphers against transition and coupling effectsImproving first-order threshold implementations of \textsf{SKINNY}On decompositions of permutation polynomials into quadratic and cubic power permutationsDomain-oriented masked bit-parallel finite-field multiplier against side-channel attacksPhysical attacks and beyondHold your breath, PRIMATEs are lightweightUnifying freedom and separation for tight probing-secure compositionCryptanalysis of masked ciphers: a not so random ideaAn Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderHiding Higher-Order Side-Channel LeakageSecure hardware implementation of nonlinear functions in the presence of glitchesSide-channel resistant crypto for less than 2,300 GEReducing Randomness Complexity of Mask Refreshing AlgorithmProtecting Triple-DES Against DPAA First-Order SCA Resistant AES Without Fresh RandomnessFROM CRYPTANALYSIS TO CRYPTOGRAPHIC PROPERTY OF A BOOLEAN FUNCTIONWhite-box cryptography: don't forget about grey-box attacksArithmetic Addition over Boolean MaskingSecure Hardware Implementation of Non-linear Functions in the Presence of GlitchesOn the EA-classes of known APN functions in small dimensionsMasking Large Keys in Hardware: A Masked Implementation of McElieceFault template attacks on block ciphers exploiting fault propagationLeakage resilient value comparison with application to message authenticationParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsLightweight authenticated encryption mode suitable for threshold implementation




This page was built for publication: Threshold Implementations Against Side-Channel Attacks and Glitches