Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes - MaRDI portal

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes

From MaRDI portal
Publication:4649770

DOI10.1007/978-3-642-33027-8_5zbMath1366.94478OpenAlexW1820473293MaRDI QIDQ4649770

Begül Bilgin, Ventzislav Nikov, Svetla Nikova, Georg Stütz, Vincent Rijmen

Publication date: 13 November 2012

Published in: Cryptographic Hardware and Embedded Systems – CHES 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8_5




Related Items (26)

WARP: revisiting GFN for lightweight 128-bit block cipherDecomposition of permutations in a finite fieldConstructions of S-boxes with uniform sharingAlgebraic Decomposition for Probing SecurityConsolidating Masking SchemesDifferential uniformity and linearity of S-boxes by multiplicative complexityEnabling 3-Share Threshold Implementations for all 4-Bit S-BoxesDesign of new \(4\times 4\) S-box from finite commutative chain ringsThreshold implementations of small S-boxesA further study on bridge structures and constructing bijective S-boxes for low-latency maskingSpin me right round rotational symmetry for FPGA-specific AES: extended versionSide-Channel Analysis Protection and Low-Latency in ActionImproving first-order threshold implementations of \textsf{SKINNY}Uniform first-order threshold implementationsCryptanalysis of masked ciphers: a not so random ideaAn Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderRedefining the transparency orderUnnamed ItemParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelHow Fast Can Higher-Order Masking Be in Software?Multiplicative complexity of bijective \(4\times 4\) \(S\)-boxesArithmetic Addition over Boolean MaskingCryptographic properties of small bijective S-boxes with respect to modular additionAffine Equivalence and Its Application to Tightening Threshold ImplementationsParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksImprobable differential attacks on \texttt{PRESENT} using undisturbed bits




This page was built for publication: Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes