Results 1 to 10 of about 1,407,059 (182)

Combined Threshold Implementation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Physical security is an important aspect of devices for which an adversary can manipulate the physical execution environment. Recently, more and more attention has been directed towards a security model that combines the capabilities of passive and ...
Jakob Feldtkeller   +3 more
doaj   +2 more sources

Boolean Masking for Arithmetic Additions at Arbitrary Order in Hardware

open access: yesApplied Sciences, 2022
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. In order to protect devices that execute these algorithms against side-channel attacks, countermeasures such as
Florian Bache, Tim Güneysu
doaj   +1 more source

Low-Latency Keccak at any Arbitrary Order

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Correct application of masking on hardware implementation of cryptographic primitives necessitates the instantiation of registers in order to achieve the non-completeness (commonly said to stop the propagation of glitches). This sometimes leads to a high
Sara Zarei   +4 more
doaj   +1 more source

Threshold implementations of small S-boxes [PDF]

open access: yesCryptography and Communications, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bilgin, Begül   +5 more
openaire   +1 more source

Re-Consolidating First-Order Masking Schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Application of masking, known as the most robust and reliable countermeasure to side-channel analysis attacks, on various cryptographic algorithms has dedicated a lion’s share of research to itself.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj   +3 more sources

Second-Order SCA Security with almost no Fresh Randomness

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking schemes are among the most popular countermeasures against Side-Channel Analysis (SCA) attacks. Realization of masked implementations on hardware faces several difficulties including dealing with glitches.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj   +1 more source

Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation

open access: yesCryptography, 2020
SAEAES is the authenticated encryption algorithm instantiated by combining the SAEB mode of operation with AES, and a candidate of the NIST’s lightweight cryptography competition.
Takeshi Sugawara
doaj   +1 more source

LLTI: Low-Latency Threshold Implementations

open access: yesIEEE Transactions on Information Forensics and Security, 2021
With the enormous increase in portable cryptographic devices, physical attacks are becoming similarly popular. One of the most common physical attacks is Side-Channel Analysis (SCA), extremely dangerous due to its non-invasive nature. Threshold Implementations (TI) was proposed as the first countermeasure to provide provable security in masked hardware
Arribas Abril, Victor   +2 more
openaire   +2 more sources

New First-Order Secure AES Performance Records

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptographic implementations against Side-Channel Analysis (SCA) attacks.
Aein Rezaei Shahmirzadi   +2 more
doaj   +1 more source

Higher-Order Threshold Implementations [PDF]

open access: yes, 2014
Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking countermeasures that guarantee security in the presence of glitches use multi-party computation techniques and
Bilgin, Begül   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy