2020
DOI: 10.46586/tches.v2021.i1.402-425
|View full text |Cite
|
Sign up to set email alerts
|

Fixslicing AES-like Ciphers

Abstract: The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations. In this article, we show that the fundamental idea underlying the fixslicing technique is not of interest only for GIFT, but can be applied to other ciphers as well. Especially, we study the benefits of fixslicing in the case of AES and show that it allows to reduce by 52% the amount of operations required by the l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Expands the 16 byte public seed to the matrices P (1) = {P (1) i } i∈ [m] and P (2) = {P (2) i } i∈ [m] . We first sample the P (1) matrices, and then the P (2) matrices. The m matrices are expanded in an interleaved fashion, in column-major order.…”
Section: Symmetric Primitivesmentioning
confidence: 99%
See 1 more Smart Citation
“…Expands the 16 byte public seed to the matrices P (1) = {P (1) i } i∈ [m] and P (2) = {P (2) i } i∈ [m] . We first sample the P (1) matrices, and then the P (2) matrices. The m matrices are expanded in an interleaved fashion, in column-major order.…”
Section: Symmetric Primitivesmentioning
confidence: 99%
“…)O + P (2) i . The S i matrices are relatively expensive to compute, but they are independent of the message we are signing, so we choose to compute them only once during key generation, and store them as part of the secret key.…”
mentioning
confidence: 99%
“…Remarks. The bitsliced implementations shown above can be significantly improved by, e.g., using the more advanced fixslicing method [AP21]. But, to the best of our knowledge, state-of-the-art higher-order masked implementations of AES are based on the above strategies, and thus we choose them as well for fair comparisons.…”
Section: Skinnymentioning
confidence: 99%
“…We are able to use this representation because most AVX2 instructions are strict with the operations crossing lanes freely but can manipulate quadword (64-bit) or doubleword (32-bit) values as individual processing units. The arrangement of one bundle is similar to the barrel shifter design [22] enabling efficient circular rotations with SHUFFLE instruction instead of SHIFT instruction.…”
Section: 1mentioning
confidence: 99%