2016
DOI: 10.1007/978-3-662-53887-6_30
|View full text |Cite
|
Sign up to set email alerts
|

A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…their inputs). As in the previous subsection, this can be explained by observing that each stage of the decomposition is pseudo−1−SNI, and that the pseudo-randomized monomials are only used once in the circuit, which provides a probing-based explanation to the recent results in [CFE16].…”
Section: The Number Of Shares Vs Cycle Count Tradeoffmentioning
confidence: 99%
See 1 more Smart Citation
“…their inputs). As in the previous subsection, this can be explained by observing that each stage of the decomposition is pseudo−1−SNI, and that the pseudo-randomized monomials are only used once in the circuit, which provides a probing-based explanation to the recent results in [CFE16].…”
Section: The Number Of Shares Vs Cycle Count Tradeoffmentioning
confidence: 99%
“…For this purpose, we observe that the correctness property of threshold implementations is in fact not needed for their intermediate results (i.e., we only want the final result to be correct). It allows us to exhibit examples of 4-bit S-boxes that globally match the definition of first-order threshold implementations in two shares and two cycles (a similar example is given in [CFE16] for the Simon S-box). We then exploit this observation in order to (slightly) refine the exhaustive decomposition in [BNN + 12, RBN + 15b] for certain S-boxes.…”
Section: Introductionmentioning
confidence: 99%
“…10 000 traces. This is due to two facts: (a) masking with minimum number of two shares has in general a strong vulnerability to second- order attacks [18], (b) higher-order attacks are sensitive to the noise level [48] and our design (due to its extremely low resource utilization) has a very low switching noise particularly when the masked S-box is evaluated the entire circuit stops till the termina-tion of the S-box. Hence, the S-box is the sole source of leakage at that time.…”
Section: Discussionmentioning
confidence: 99%
“…10 000 traces. This is due to two facts: (a) masking with minimum number of two shares has in general a strong vulnerability to second-order attacks [CFE16], (b) higher-order attacks are sensitive to the noise level [PRB09] and our design (due to its extremely low resource utilization) has a very low switching noise particularly when the masked S-box is evaluated the entire circuit stops till the termination of the S-box. Hence, the S-box is the sole source of leakage at that time.…”
Section: Sca Evaluationmentioning
confidence: 99%