2016
DOI: 10.1007/978-3-662-53140-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Masking AES with $$d+1$$ Shares in Hardware

Abstract: Abstract. Masking requires splitting sensitive variables into at least d + 1 shares to provide security against DPA attacks at order d. To this date, this minimal number has only been deployed in software implementations of cryptographic algorithms and in the linear parts of their hardware counterparts. So far there is no hardware construction that achieves this lower bound if the function is nonlinear and the underlying logic gates can glitch. In this paper, we give practical implementations of the AES using … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 50 publications
(23 citation statements)
references
References 23 publications
0
23
0
Order By: Relevance
“…5) to ensure the uniformity of the output masking shares after the multiplication operation. Therefore, a total number of random bits per round for our masking scheme is 116, which is 10 bits less than the work of [18] and significantly less (about 28.4%) compared to implementation in [19] which uses 46 bits in extent but requires a slightly smaller chip area.…”
Section: Performance Evaluation Of Our Implementationmentioning
confidence: 97%
See 4 more Smart Citations
“…5) to ensure the uniformity of the output masking shares after the multiplication operation. Therefore, a total number of random bits per round for our masking scheme is 116, which is 10 bits less than the work of [18] and significantly less (about 28.4%) compared to implementation in [19] which uses 46 bits in extent but requires a slightly smaller chip area.…”
Section: Performance Evaluation Of Our Implementationmentioning
confidence: 97%
“…In 2016, De Cnudde et al . [19] introduced a general method to protect AES‐128 against d th‐order DPA attacks using d+1 masking shares. In particular, to implement the second‐order masking of AES‐128, this approach uses 162 random bits per round and the cost of hardware implementation is around 10 kGE.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations