Energy consumption of protected cryptographic hardware cores. An experimental study
From MaRDI portal
Publication:6088711
DOI10.1007/978-3-031-29497-6_10MaRDI QIDQ6088711
Thorben Moos, Aein Rezaei Shahmirzadi, Amir Moradi
Publication date: 16 November 2023
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- PRINCEv2. More security for (almost) no overhead
- A construction of a cipher from a single pseudorandom permutation.
- Masking AES with \(d+1\) shares in hardware
- Cryptanalysis of masked ciphers: a not so random idea
- Midori: A Block Cipher for Low Energy
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Affine Equivalence and Its Application to Tightening Threshold Implementations
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Higher-Order Threshold Implementations
- The LED Block Cipher
- Hardware Private Circuits: From Trivial Composition to Full Verification
- Consolidating Masking Schemes
- PRESENT: An Ultra-Lightweight Block Cipher
- Threshold Implementations Against Side-Channel Attacks and Glitches
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- A More Efficient AES Threshold Implementation
- Impeccable Circuits
This page was built for publication: Energy consumption of protected cryptographic hardware cores. An experimental study