2015 International Conference on Information Society (I-Society) 2015
DOI: 10.1109/i-society.2015.7366878
|View full text |Cite
|
Sign up to set email alerts
|

Efficient implementation of masked AES on Side-Channel Attack Standard Evaluation Board

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Some of the effects of SCA on AES are listed in Ref. [14,15]. Methods which neutralize the effect of SCA on AES are also proposed and detailed explanation of those methods is given in the Ref.…”
Section: Addroundkey Transformationmentioning
confidence: 99%
“…Some of the effects of SCA on AES are listed in Ref. [14,15]. Methods which neutralize the effect of SCA on AES are also proposed and detailed explanation of those methods is given in the Ref.…”
Section: Addroundkey Transformationmentioning
confidence: 99%
“…In contrast to hiding techniques, masking techniques are applied on the algorithmic level and randomize the intermediate values of the computation or by adding dummy instructions to avoid dependencies between the internal operation and the leaked side-channel information without changing the original functionality of the design [3,4]. In [23], Nikova et al propose a threshold implementation (TI) countermeasure against first-order DPA based on secretsharing.…”
Section: Side-channel Attackmentioning
confidence: 99%
“…To mitigate the risk of side-channel attacks, countermeasures such as message hiding [2] and masking technique [3,4] are presented in the literature. The objective of such techniques is to increase the time required to reveal the secret key thereby protect cryptographic implementations from different side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Many information about the weaknesses of the AES when implemented in hardware have been analysed in detail in several research projects [14] and some authors have highlighted the threat of power-based SCAs [15]. To solve the power emission vulnerability, various SCA countermeasures have been proposed based on modifying the AES circuit in order to change the power emission [16] and the robustness of SCA solutions has also been evaluated and characterized [17]. When attacking an AES implementation with CPA or DPA, the attack requires to target a certain element of the circuit whose logic state depends on the secret data to be extracted and a function F() which determines its state.…”
Section: Side-channel Attacks On Hardwarementioning
confidence: 99%