2014
DOI: 10.1007/978-3-319-06734-6_17
|View full text |Cite
|
Sign up to set email alerts
|

A More Efficient AES Threshold Implementation

Abstract: Abstract. Threshold Implementations provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in the implementation of logic functions. At Eurocrypt 2011 Moradi et al. published the to date most compact Threshold Implementation of AES-128 encryption. Their work shows that the number of required random bits may be an additional evaluation criterion, next to area and speed. We present a new Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
82
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 100 publications
(84 citation statements)
references
References 23 publications
2
82
0
Order By: Relevance
“…Moradi's design was also used and modified by Bilgin et al [2,3,6] and recently by De Cnudde et al [7] for a d + 1 share CMS TI. The control path of our modified AES design consists of a linear-feedback shift register (LFSR), the round constant generation module (RCON), and some additional logic gates to generate the control signals (see [17] for more details).…”
Section: Th -Order Secure Aes Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…Moradi's design was also used and modified by Bilgin et al [2,3,6] and recently by De Cnudde et al [7] for a d + 1 share CMS TI. The control path of our modified AES design consists of a linear-feedback shift register (LFSR), the round constant generation module (RCON), and some additional logic gates to generate the control signals (see [17] for more details).…”
Section: Th -Order Secure Aes Implementationmentioning
confidence: 99%
“…It has been extensively researched and extended by Bilgin et al [1,4] during the last years. There exist many protected hardware implementations that are based on TI [2,3,17].…”
Section: Introductionmentioning
confidence: 99%
“…This eventually results in massive implementation overheads. For example, the first-order DPA-secure threshold implementations of AES in [10,42] add an areatime overhead of a factor of four.…”
Section: Maskingmentioning
confidence: 99%
“…Using existing memory encryption and authentication schemes with DPA-protected implementations, on the other hand, would result in overheads of a factor of four to a few hundred [6,10,42,45] and thus be far more expensive, eventually rendering memory encryption and authentication in many applications impractical.…”
Section: Memory Overheadmentioning
confidence: 99%
See 1 more Smart Citation