Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
From MaRDI portal
Publication:4649770
DOI10.1007/978-3-642-33027-8_5zbMath1366.94478OpenAlexW1820473293MaRDI QIDQ4649770
Begül Bilgin, Ventzislav Nikov, Svetla Nikova, Georg Stütz, Vincent Rijmen
Publication date: 13 November 2012
Published in: Cryptographic Hardware and Embedded Systems – CHES 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8_5
Related Items (26)
WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Decomposition of permutations in a finite field ⋮ Constructions of S-boxes with uniform sharing ⋮ Algebraic Decomposition for Probing Security ⋮ Consolidating Masking Schemes ⋮ Differential uniformity and linearity of S-boxes by multiplicative complexity ⋮ Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes ⋮ Design of new \(4\times 4\) S-box from finite commutative chain rings ⋮ Threshold implementations of small S-boxes ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ Improving first-order threshold implementations of \textsf{SKINNY} ⋮ Uniform first-order threshold implementations ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order ⋮ Redefining the transparency order ⋮ Unnamed Item ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ Multiplicative complexity of bijective \(4\times 4\) \(S\)-boxes ⋮ Arithmetic Addition over Boolean Masking ⋮ Cryptographic properties of small bijective S-boxes with respect to modular addition ⋮ Affine Equivalence and Its Application to Tightening Threshold Implementations ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks ⋮ Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
This page was built for publication: Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes