Proceedings of the Computing Frontiers Conference 2017
DOI: 10.1145/3075564.3079067
|View full text |Cite
|
Sign up to set email alerts
|

DPA on hardware implementations of Ascon and Keyak

Abstract: Article 25fa pilot End User AgreementThis publication is distributed under the terms of Article 25fa of the Dutch Copyright Act (Auteurswet) with explicit consent by the author. Dutch law entitles the maker of a short scientific work funded either wholly or partially by Dutch public funds to make that work publicly available for no consideration following a reasonable period of time after the work was first published, provided that clear reference is made to the source of the first publication of the work.This… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 15 publications
0
14
0
1
Order By: Relevance
“…Next, we give a list of papers that either evaluate the side-channel and fault resistance of Ascon or elaborate protection mechanisms against side-channel and fault attacks [4,7,12,[28][29][30]50,51,55,60,68,[77][78][79]83].…”
Section: Implementation Security and Robustnessmentioning
confidence: 99%
“…Next, we give a list of papers that either evaluate the side-channel and fault resistance of Ascon or elaborate protection mechanisms against side-channel and fault attacks [4,7,12,[28][29][30]50,51,55,60,68,[77][78][79]83].…”
Section: Implementation Security and Robustnessmentioning
confidence: 99%
“…Cette première estimation de consommation permettra d'effectuer par la suite la caractérisation sécuritaire du circuit. Il est envisageable d'utiliser les courbes de consommation produites par PrimeTime pour réaliser des attaques par canaux cachés telles que l'analyse différentielle de la consommation (9). La figure 5 permet de mettre en évidence la différence de consommation pour 3 chiffrements différents qu'il est possible d'exploiter pour retrouver la clé secrète.…”
Section: Estimation De Consommationunclassified
“…His new mechanism called "Changing of the Guards" can construct uniform TI for the entire layer of bijective S-boxes. This method was later applied to AES [WM18], KETJE [ANR19], ASCON and Keyac [SD17] to achieve uniformity in first-order secure designs.…”
Section: Related Workmentioning
confidence: 99%