2014
DOI: 10.1007/s12095-014-0104-7
|View full text |Cite
|
Sign up to set email alerts
|

Threshold implementations of small S-boxes

Abstract: Threshold implementation (TI) is a masking method that provides security against first-order DPA with minimal assumptions on the hardware. It is based on multi-party computation and secret sharing. In this paper, we provide an efficient technique to find TIs for all 3 and 4-bit permutations which also covers the set of 3 × 3 and 4 × 4 invertible S-boxes. We also discuss alternative methods to construct shared functions by changing the number of variables or shares. Moreover, we further consider the TI of 5-bit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(46 citation statements)
references
References 33 publications
0
46
0
Order By: Relevance
“…The most popular scheme is the threshold implementation (TI) masking scheme introduced by Nikova et al [18]. It has been extensively researched and extended by Bilgin et al [1,4] during the last years. There exist many protected hardware implementations that are based on TI [2,3,17].…”
Section: Introductionmentioning
confidence: 99%
“…The most popular scheme is the threshold implementation (TI) masking scheme introduced by Nikova et al [18]. It has been extensively researched and extended by Bilgin et al [1,4] during the last years. There exist many protected hardware implementations that are based on TI [2,3,17].…”
Section: Introductionmentioning
confidence: 99%
“…Otherwise, the security of such an implementation cannot be guaranteed. Note that fulfilling the uniformity property of TI constructions is amongst its most difficult challenges, and it has been the core topic of several articles like [22], [25]- [28]. Alternatively, the shares can be remasked at the end of every non-uniformly shared non-linear function (see [29], [30]), which requires a source to provide fresh randomness at every clock cycle.…”
Section: B Threshold Implementationsmentioning
confidence: 99%
“…The number of 4 × 4 s-boxes up to affine equivalence is 302 [2], among which 10 s-boxes have nonlinearity 4, degree 3 and absolute autocorrelation value 8, which are the basic cryptographic properties that make these s-boxes useful in practice. We compute the TO values of each of these 10 s-boxes (denoted as F ) and their extended affine equivalent ones (denoted as G).…”
Section: To Of S-boxes In the Same (Extended) Affine Equivalence Classesmentioning
confidence: 99%