Results 1 to 10 of about 1,407,059 (182)
Combined Threshold Implementation
Physical security is an important aspect of devices for which an adversary can manipulate the physical execution environment. Recently, more and more attention has been directed towards a security model that combines the capabilities of passive and ...
Jakob Feldtkeller +3 more
doaj +2 more sources
Boolean Masking for Arithmetic Additions at Arbitrary Order in Hardware
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. In order to protect devices that execute these algorithms against side-channel attacks, countermeasures such as
Florian Bache, Tim Güneysu
doaj +1 more source
Low-Latency Keccak at any Arbitrary Order
Correct application of masking on hardware implementation of cryptographic primitives necessitates the instantiation of registers in order to achieve the non-completeness (commonly said to stop the propagation of glitches). This sometimes leads to a high
Sara Zarei +4 more
doaj +1 more source
Threshold implementations of small S-boxes [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilgin, Begül +5 more
openaire +1 more source
Re-Consolidating First-Order Masking Schemes
Application of masking, known as the most robust and reliable countermeasure to side-channel analysis attacks, on various cryptographic algorithms has dedicated a lion’s share of research to itself.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj +3 more sources
Second-Order SCA Security with almost no Fresh Randomness
Masking schemes are among the most popular countermeasures against Side-Channel Analysis (SCA) attacks. Realization of masked implementations on hardware faces several difficulties including dealing with glitches.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj +1 more source
Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation
SAEAES is the authenticated encryption algorithm instantiated by combining the SAEB mode of operation with AES, and a candidate of the NIST’s lightweight cryptography competition.
Takeshi Sugawara
doaj +1 more source
LLTI: Low-Latency Threshold Implementations
With the enormous increase in portable cryptographic devices, physical attacks are becoming similarly popular. One of the most common physical attacks is Side-Channel Analysis (SCA), extremely dangerous due to its non-invasive nature. Threshold Implementations (TI) was proposed as the first countermeasure to provide provable security in masked hardware
Arribas Abril, Victor +2 more
openaire +2 more sources
New First-Order Secure AES Performance Records
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks.
Aein Rezaei Shahmirzadi +2 more
doaj +1 more source
Higher-Order Threshold Implementations [PDF]
Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking countermeasures that guarantee security in the presence of glitches use multi-party computation techniques and
Bilgin, Begül +4 more
openaire +3 more sources

