搜索结果: 1-9 共查到“Threshold Implementations”相关记录9条 . 查询时间(0.046 秒)
Threshold Implementations (TI) are secure algorithmic countermeasures against side-channel attacks in the form of differential power analysis. The strength of TI lies in its minimal algorithmic requir...
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
side-channel analysis threshold implementation uniformity
2018/11/13
Threshold Implementations are well-known as a provably firstorder secure Boolean masking scheme even in the presence of glitches. A precondition for their security proof is a uniform input distributio...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
Threshold Implementations of GIFT: A Trade-off Analysis
Side-channel Threshold Implementation DPA
2017/10/30
Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using dif...
Most masking schemes used as a countermeasure against side-channel analysis attacks require an extensive amount of fresh random bits on the fly. This is burdensome especially for lightweight cryptosys...
A note on the security of threshold implementations with d + 1 input shares
threshold implementations masking
2016/5/3
Recently, threshold implementations (TI) with d+1 input shares have been proposed at Crypto 2015. This optimization aims for more lightweight TI designs while keeping the glitch-resistance of the orig...
Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with...
A note on the security of Higher-Order Threshold Implementations
higher-order DPA threshold implementations glitches
2016/1/5
At ASIACRYPT 2014, Bilgin et al. describe higher-order threshold implementations: a masking countermeasure claiming resistance against higher-order differential power analysis attacks. In this note, w...
Affine Equivalence and its Application to Tightening Threshold Implementations
side-channel protection FPGA TI higher-order
2015/12/24
Motivated by the development of Side-Channel Analysis (SCA)
countermeasures which can provide security up to a certain order, defeating
higher-order attacks has become amongst the most challenging
...