2015
DOI: 10.1007/978-3-319-21476-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Faster Mask Conversion with Lookup Tables

Abstract: Abstract. Masking is an effective and widely-used countermeasure to thwart Differential Power Analysis (DPA) attacks on symmetric cryptosystems. When a symmetric cipher involves a combination of Boolean and arithmetic operations, it is necessary to convert the masks from one form to the other. There exist algorithms for mask conversion that are secure against first-order attacks, but they can not be generalized to higher orders. At CHES 2014, Coron, Großschädl and Vadnala (CGV) introduced a secure conversion s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…They described the use of pre-computation tables to obtain large benefits in terms of execution time, although it required additional space in RAM. There have also been numerous attempts to optimize the memory use [17][18][19][20][21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They described the use of pre-computation tables to obtain large benefits in terms of execution time, although it required additional space in RAM. There have also been numerous attempts to optimize the memory use [17][18][19][20][21].…”
Section: Related Workmentioning
confidence: 99%
“…They described the use of pre-computation tables to obtain large benefits in terms of execution time, although it required additional space in RAM. There have also been numerous attempts to optimize the memory use [17][18][19][20][21].Recently B. Debraize proposed a conversion algorithm that offered a substantial reduction in memory for the use of pre-computation tables [22]. Briefly, this proposal iterates the conversion phase with a k-bit value using a (k + 1)-bit table.…”
mentioning
confidence: 99%
“…A few countermeasures to protect the AND operation are suggested in [2]. Moreover, many suggestions [24][25][26][27][28][29][30][31][32] have been proposed with respect to the Addition operation.…”
Section: Countermeasure For Block Cipher Seedmentioning
confidence: 99%