2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) 2016
DOI: 10.1109/asianhost.2016.7835556
|View full text |Cite
|
Sign up to set email alerts
|

Comparing Sboxes of ciphers from the perspective of side-channel attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…We refer the interested readers to [6], [35], where the authors use machine learning techniques to determine the best moment of transition between each part of the hybrid algorithm. From the practical experiments conducted in [13], [29], [36], we have some reference on the influence of confusion coefficient variance in side-channel scenarios. Under the Hamming-Weight power model, high confusion coefficient variance values imply better resistance to correlation power attacks as shown in [13], [29].…”
Section: A Experimental Resultsmentioning
confidence: 99%
“…We refer the interested readers to [6], [35], where the authors use machine learning techniques to determine the best moment of transition between each part of the hybrid algorithm. From the practical experiments conducted in [13], [29], [36], we have some reference on the influence of confusion coefficient variance in side-channel scenarios. Under the Hamming-Weight power model, high confusion coefficient variance values imply better resistance to correlation power attacks as shown in [13], [29].…”
Section: A Experimental Resultsmentioning
confidence: 99%
“…The first, Hamming Distance (HD) model, includes properties like Modified Transparency Order (MTO) [3] and Revised Transparency Order (RTO) [10]. For the second group, Hamming Weight (HW) leakage model, properties like Transparency Order (TO) [2] 1 , Confusion Coefficient Variance (CCV) [7], Modified Transparency Order for the zero logic precharge (M T O 0 ) [8] and Revised Transparency Order for the zero logic precharge (RT O 0 ) [10] can be found in the literature.…”
Section: Introductionmentioning
confidence: 99%
“…All Ascon family members provide 128-bit security in the notion of nonce-based authenticated encryption with associated data (AEAD), that is, they protect the confidentiality of the plaintext (except its length) and the integrity of ciphertext including the associated data (under adaptive forgery attempts). The number of processed plaintext and associated data blocks protected by the encryption algorithm is limited to a total of 2 64 blocks per key, which corresponds to 2 67 bytes (for Ascon-128, Ascon-80pq) or 2 68 bytes (for Ascon-128a). We consider this as more than sufficient for lightweight applications in practice.…”
Section: Authenticated Encryptionmentioning
confidence: 99%
“…Next, we give a list of papers that either evaluate the side-channel and fault resistance of Ascon or elaborate protection mechanisms against side-channel and fault attacks [4,7,12,[28][29][30]50,51,55,60,68,[77][78][79]83].…”
Section: Implementation Security and Robustnessmentioning
confidence: 99%